General

  • Target

    02dd9098e44ae9cbb82520b66b925461_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240427-kqpp1sfg2z

  • MD5

    02dd9098e44ae9cbb82520b66b925461

  • SHA1

    90f2ced6f6fc6d9aa1e90e0263c6ffdde1ad5d62

  • SHA256

    693a986d4a416a8baa4c39cf4280b648f19add9ad5ed73577432dfc59424e1da

  • SHA512

    cd5c7dda02c2c4bb712548d62c79d83638cff98dd3fc07907672a2e32138722c76f8334e9b8aa7de4c0f99264c21ac60b03a638fdd83f9bd3cacfce5014be8d7

  • SSDEEP

    24576:Yk70TrcW8O5xBPNU5vNC2eJ0p7YSyohIF0+aca3qMvURpq/FFdCUVfZaVd:YkQTAHJeJJSyouF0PP8q/F3RM

Malware Config

Extracted

Family

vidar

Version

4.9

Botnet

147

C2

http://benediktonpoins.ug/

Attributes
  • profile_id

    147

Targets

    • Target

      02dd9098e44ae9cbb82520b66b925461_JaffaCakes118

    • Size

      1.1MB

    • MD5

      02dd9098e44ae9cbb82520b66b925461

    • SHA1

      90f2ced6f6fc6d9aa1e90e0263c6ffdde1ad5d62

    • SHA256

      693a986d4a416a8baa4c39cf4280b648f19add9ad5ed73577432dfc59424e1da

    • SHA512

      cd5c7dda02c2c4bb712548d62c79d83638cff98dd3fc07907672a2e32138722c76f8334e9b8aa7de4c0f99264c21ac60b03a638fdd83f9bd3cacfce5014be8d7

    • SSDEEP

      24576:Yk70TrcW8O5xBPNU5vNC2eJ0p7YSyohIF0+aca3qMvURpq/FFdCUVfZaVd:YkQTAHJeJJSyouF0PP8q/F3RM

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

4
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

4
T1005

Tasks