General

  • Target

    4a9fbb273cfe930a7f70f20c8a77b24125f7f9b56b4de990b3fc25da67c7b8d3

  • Size

    178KB

  • Sample

    240417-qbvklsge83

  • MD5

    a0efa9f990e34dd37dd97aa463e1c330

  • SHA1

    44b17f0e2e0f36a2634b3c9b6fba2cd99a8efce0

  • SHA256

    4a9fbb273cfe930a7f70f20c8a77b24125f7f9b56b4de990b3fc25da67c7b8d3

  • SHA512

    0453790921641fa57299ede24011e9ec152b33c688f57a06a9dabdc7035f3c3bc07a2f9ea09aeb75c508ceb582d6f4868bbb18c016ca574934ac32b441d5e399

  • SSDEEP

    3072:R4VKvdxDDa9Nab1KaaguXrtS6Ifydk4hqkPLfxAx6mvSLhVMQ9fm9VGECOhW:CSx2/k1tZuXZcEhjL5AxgLhVMksPW

Malware Config

Extracted

Family

vidar

Version

8.6

Botnet

5739ef2bbcd39fcd59c5746bfe4238c5

C2

https://steamcommunity.com/profiles/76561199658817715

https://t.me/sa9ok

Attributes
  • profile_id_v2

    5739ef2bbcd39fcd59c5746bfe4238c5

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36

Targets

    • Target

      afce72cd3bc717c784962083066e3ede2b0aaadbe0908ec7360096c923774fa5.exe

    • Size

      277KB

    • MD5

      8dae8b6a6be6e3527183594d1c26a2d3

    • SHA1

      b87e40cee60869a36e79c88c8a3a34baf0bc4889

    • SHA256

      afce72cd3bc717c784962083066e3ede2b0aaadbe0908ec7360096c923774fa5

    • SHA512

      0bf065700db647efba39a13a58242a595907e6c11885575cf0bdad9e23ab40583c8a6535464e46d75d075e20d88b7a6305a761df9da787fdc8728483dd48f96e

    • SSDEEP

      6144:GtcSsUDC2OZuhYRQqPY3x/OKV/LYZsTZgzENh+a1:TSsUO2cuhY1m/VYZsI

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks