General

  • Target

    55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.zip

  • Size

    227KB

  • Sample

    240402-nk1f4sgh62

  • MD5

    74d46c0832af38e48b4ad0cc67d7f8e8

  • SHA1

    d058c8e43dbc6aca4240bbe7418aa28884a79017

  • SHA256

    2da7a8183461d1626f9c4242c322ead7ca5bede550941995a4bcd1e6380a8acc

  • SHA512

    57c2ca5d9badad490298e91db8278d7d896f2f6f09f0994cb3c1f1c9a9b88db9102ba00632e514c96b761a62d2e9fcfb7c47df5dfd5c01529af5426595743889

  • SSDEEP

    6144:GLrbiONnDktdk9LSyOrZZhg3SFprcP2dKtiy9slZlg8Y9C1V:ibiOxoXk9LSJrLhpFpraoh

Malware Config

Extracted

Family

vidar

Version

8.6

Botnet

72f54d93118188013f2386eef7e5cc05

C2

https://steamcommunity.com/profiles/76561199658817715

https://t.me/sa9ok

Attributes
  • profile_id_v2

    72f54d93118188013f2386eef7e5cc05

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36

Targets

    • Target

      55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.exe

    • Size

      271KB

    • MD5

      8b8db4eaa6f5368eb5f64359c6197b43

    • SHA1

      e9b51842e2d2f39fa06e466ae73af341ddffe1c8

    • SHA256

      55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77

    • SHA512

      4da734da30af148f246f433b71c72677b9f78698424db15eba364233dff183cb998f9be13d2832872829ac545be1e15ff75ceb85fca3fd0784265fd576db0056

    • SSDEEP

      6144:xfL+oq+hnjsVl3dRQTLU+2bRRR17+fYHPfIMDPSBJ7Y/B4aSi3V:xfL5njsVlNuc++Rj17+fYHPfIg4Y54ap

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

    • Target

      ⠨/start.vbs

    • Size

      231B

    • MD5

      abe1dd23ab4c11aae54f1898c780c0b5

    • SHA1

      bb2f974b3e0af2baa40920b475582bfd4fb28001

    • SHA256

      89054e19532a9a62ca3403a8899495bf6f06557ff886b475a04227eb8aba7b12

    • SHA512

      e9ec437a32301078ea69ce2f36dadab68315d5e56d94c4d579d3409ccbe0c9e00c3aed7baa0fa6d656fb8ed23213f4c01fb2d108c1a0ed11c58c76cd00f9a99d

    Score
    1/10
    • Target

      ⠨/temp.bat

    • Size

      204KB

    • MD5

      72b17467a49b7813856fa604d1d291c8

    • SHA1

      3116d07854d56f0bc505be8b80804a7319208739

    • SHA256

      e24aaddfa2ece0891ad7b3c51779c65bbf95e4fded59fc46fe4fef311e1de3e1

    • SHA512

      38c99cc716097ee7cb642203432ffbd1ef6ce8a0c9b21aa2827962b82456ecb3113fa1edd362aab013737e3bdfb2d0803145fc0caf612054ba47f6454c3a4843

    • SSDEEP

      3072:YZ5q1dIOxM7uywhXemKY2GDM676x3P6qpsIRRpAdJ6PjzqqaTehW6+Goun9Oem1Z:e+PLjkf7VGrrPrmKCeFIzxzwhFfyGWzC

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks