General

  • Target

    84e75d31fb7f3bf7412852353d89cdaffd1192d52da5c92a4978091fe17fc9a5

  • Size

    385KB

  • Sample

    240429-elk85she75

  • MD5

    efc606a788ec0ade4d09ffc400a05eff

  • SHA1

    1bdc3cf0c3a91a8e2f20bf8405c4af18acfa3b88

  • SHA256

    84e75d31fb7f3bf7412852353d89cdaffd1192d52da5c92a4978091fe17fc9a5

  • SHA512

    4d9440bb9e1e439a1520d6277a396bf1097d0e11a69ca64b26b69ab4108530598f4243833b659aade13cb3e7a185284b1f0c5cc9edacc00ff6b736fe6a814317

  • SSDEEP

    6144:hdWcSqi3scNsdJAYv3HHL5C+AUtEgV+zdkON5VrJO1tLry:hdWD4n/L5HAUr+zdPNRO1tL

Malware Config

Extracted

Family

vidar

Version

8.1

Botnet

8698e6090462c2758aa8aa2f4abb74a2

C2

https://steamcommunity.com/profiles/76561199649267298

https://t.me/uprizin

Attributes
  • profile_id_v2

    8698e6090462c2758aa8aa2f4abb74a2

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 OPR/96.0.0.0

Targets

    • Target

      84e75d31fb7f3bf7412852353d89cdaffd1192d52da5c92a4978091fe17fc9a5

    • Size

      385KB

    • MD5

      efc606a788ec0ade4d09ffc400a05eff

    • SHA1

      1bdc3cf0c3a91a8e2f20bf8405c4af18acfa3b88

    • SHA256

      84e75d31fb7f3bf7412852353d89cdaffd1192d52da5c92a4978091fe17fc9a5

    • SHA512

      4d9440bb9e1e439a1520d6277a396bf1097d0e11a69ca64b26b69ab4108530598f4243833b659aade13cb3e7a185284b1f0c5cc9edacc00ff6b736fe6a814317

    • SSDEEP

      6144:hdWcSqi3scNsdJAYv3HHL5C+AUtEgV+zdkON5VrJO1tLry:hdWD4n/L5HAUr+zdPNRO1tL

    • Detect Vidar Stealer

    • Detect ZGRat V1

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks