General

  • Target

    Lauucher-PC_S0FTv2O24_2.7z

  • Size

    123.0MB

  • Sample

    240320-2fw5sadh9t

  • MD5

    e8d57cba42ae83a31e06d18c3cf48b78

  • SHA1

    d064afa341112a7318dff7ada16c2bf21dc424ba

  • SHA256

    845caf9988d39b22d2f3c57ba6111f956c3add71463565afc50c61930cef8e40

  • SHA512

    cbec15abadb58c25298fe8d9ab27674f299c1c6a9f5d7d81a36ba6ef8a1ca277dca336cd4c8ec4e1c0c5fe9af3becb3b7eb13334b1c7b5c49889ea656a1062b1

  • SSDEEP

    3145728:koktC0Nyznug5rtJWMaiUnzcTVgjT14Nr2zpUxEt6e:ko0ng5rYiUGI14KpUWH

Malware Config

Extracted

Family

vidar

Version

7.8

Botnet

97b92d10859a319d8736cd53ff3f8868

C2

http://5.252.118.12:80

https://t.me/voolkisms

https://t.me/karl3on

https://steamcommunity.com/profiles/76561199637071579

Attributes
  • profile_id_v2

    97b92d10859a319d8736cd53ff3f8868

  • user_agent

    Mozilla/5.0 (X11; Linux 3.5.4-1-ARCH i686; es) KHTML/4.9.1 (like Gecko) Konqueror/4.9

Targets

    • Target

      Lauucher-PC_S0FTv2O24_2.7z

    • Size

      123.0MB

    • MD5

      e8d57cba42ae83a31e06d18c3cf48b78

    • SHA1

      d064afa341112a7318dff7ada16c2bf21dc424ba

    • SHA256

      845caf9988d39b22d2f3c57ba6111f956c3add71463565afc50c61930cef8e40

    • SHA512

      cbec15abadb58c25298fe8d9ab27674f299c1c6a9f5d7d81a36ba6ef8a1ca277dca336cd4c8ec4e1c0c5fe9af3becb3b7eb13334b1c7b5c49889ea656a1062b1

    • SSDEEP

      3145728:koktC0Nyznug5rtJWMaiUnzcTVgjT14Nr2zpUxEt6e:ko0ng5rYiUGI14KpUWH

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks