General

  • Target

    88f173d3106eec489eeb0cfb9d93ab90_NEIKI

  • Size

    276KB

  • Sample

    240508-2vzt8aca4y

  • MD5

    88f173d3106eec489eeb0cfb9d93ab90

  • SHA1

    8ea7e398491bdd803956ba29660a6d5fe7c69692

  • SHA256

    81a69ae81239de2b87658d6056fe0b9dfb1663c5dacc279646a22b47af06c478

  • SHA512

    510832b3a68c9e9839763736e49eaa9cfd5d4dc00e8b17edec18e56d0252e8077485d1b56eabbc2b658badbb579d610ef1c0e32505389ec429f314d4fd43ce3f

  • SSDEEP

    3072:TAfmxj3LlZF9H+52cTKqRMIsWkll98jTfjBbBBhRXQrt7ovbeBT:/lp9m2cTUqASTfj9B5k9M

Malware Config

Extracted

Family

vidar

Version

6.5

Botnet

d1fd1813828c51f2b0fb9c5d1459b66c

C2

https://t.me/starcofeeth

https://steamcommunity.com/profiles/76561199571056594

Attributes
  • profile_id_v2

    d1fd1813828c51f2b0fb9c5d1459b66c

  • user_agent

    Mozilla/5.0 (X11; CrOS x86_64 15329.59.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36

Targets

    • Target

      88f173d3106eec489eeb0cfb9d93ab90_NEIKI

    • Size

      276KB

    • MD5

      88f173d3106eec489eeb0cfb9d93ab90

    • SHA1

      8ea7e398491bdd803956ba29660a6d5fe7c69692

    • SHA256

      81a69ae81239de2b87658d6056fe0b9dfb1663c5dacc279646a22b47af06c478

    • SHA512

      510832b3a68c9e9839763736e49eaa9cfd5d4dc00e8b17edec18e56d0252e8077485d1b56eabbc2b658badbb579d610ef1c0e32505389ec429f314d4fd43ce3f

    • SSDEEP

      3072:TAfmxj3LlZF9H+52cTKqRMIsWkll98jTfjBbBBhRXQrt7ovbeBT:/lp9m2cTUqASTfj9B5k9M

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks