General

  • Target

    55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.zip

  • Size

    227KB

  • Sample

    240402-msmdsafe7v

  • MD5

    16a56d01cc9f33cdac66c0abce8711a1

  • SHA1

    10e18edcfe08c9bdafe5cbeb3320a3e3eab6305d

  • SHA256

    bb88f7580c25b779360d2603e5cc6faedb86c19575773c9535a66fbc78318767

  • SHA512

    d0c54bf086134165d693c270e223639238e3593a9b35e1612b4637e4efad7b99637da42fcc2cda931f19c3dd47d49ee957690e09df451062837d55f6731e7a96

  • SSDEEP

    6144:cfdn9umXQ0OYBgjrCmOxUFaJS64h6NDdN:cfFZXyYSrCm1FNhgdN

Malware Config

Extracted

Family

vidar

Version

8.6

Botnet

72f54d93118188013f2386eef7e5cc05

C2

https://steamcommunity.com/profiles/76561199658817715

https://t.me/sa9ok

Attributes
  • profile_id_v2

    72f54d93118188013f2386eef7e5cc05

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36

Targets

    • Target

      55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.exe

    • Size

      271KB

    • MD5

      8b8db4eaa6f5368eb5f64359c6197b43

    • SHA1

      e9b51842e2d2f39fa06e466ae73af341ddffe1c8

    • SHA256

      55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77

    • SHA512

      4da734da30af148f246f433b71c72677b9f78698424db15eba364233dff183cb998f9be13d2832872829ac545be1e15ff75ceb85fca3fd0784265fd576db0056

    • SSDEEP

      6144:xfL+oq+hnjsVl3dRQTLU+2bRRR17+fYHPfIMDPSBJ7Y/B4aSi3V:xfL5njsVlNuc++Rj17+fYHPfIg4Y54ap

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

    • Target

      ⠨/start.vbs

    • Size

      231B

    • MD5

      abe1dd23ab4c11aae54f1898c780c0b5

    • SHA1

      bb2f974b3e0af2baa40920b475582bfd4fb28001

    • SHA256

      89054e19532a9a62ca3403a8899495bf6f06557ff886b475a04227eb8aba7b12

    • SHA512

      e9ec437a32301078ea69ce2f36dadab68315d5e56d94c4d579d3409ccbe0c9e00c3aed7baa0fa6d656fb8ed23213f4c01fb2d108c1a0ed11c58c76cd00f9a99d

    Score
    1/10
    • Target

      ⠨/temp.bat

    • Size

      204KB

    • MD5

      72b17467a49b7813856fa604d1d291c8

    • SHA1

      3116d07854d56f0bc505be8b80804a7319208739

    • SHA256

      e24aaddfa2ece0891ad7b3c51779c65bbf95e4fded59fc46fe4fef311e1de3e1

    • SHA512

      38c99cc716097ee7cb642203432ffbd1ef6ce8a0c9b21aa2827962b82456ecb3113fa1edd362aab013737e3bdfb2d0803145fc0caf612054ba47f6454c3a4843

    • SSDEEP

      3072:YZ5q1dIOxM7uywhXemKY2GDM676x3P6qpsIRRpAdJ6PjzqqaTehW6+Goun9Oem1Z:e+PLjkf7VGrrPrmKCeFIzxzwhFfyGWzC

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks