General

  • Target

    FileCenterSetup12 - Copy.exe

  • Size

    298.9MB

  • Sample

    240614-rz72aavcra

  • MD5

    646609593e2dc4cdf186f0be4afdd869

  • SHA1

    d41ff0e58b86467ebcf7b646ffd2f9851f091469

  • SHA256

    dbc77d91f4364c8ebf577f41405a1969203092f1cc69d984940c2ba7bf541113

  • SHA512

    e8845b07917f61bab64395cbb69da1237669082fae2ec478da3ed4de27480fa14b0b9e40fa3ccaf5ad816efbb8d71644e53b61748fa3fd9f33a0d2b6d5e028e5

  • SSDEEP

    6291456:lnV+k6bAnEDrT9MJVeTJ3JkUnU1GFc9EuyiWBlMU6cgnnE:lnVesnEj9MJkTDNnkk7uWrR56E

Malware Config

Targets

    • Target

      FileCenterSetup12 - Copy.exe

    • Size

      298.9MB

    • MD5

      646609593e2dc4cdf186f0be4afdd869

    • SHA1

      d41ff0e58b86467ebcf7b646ffd2f9851f091469

    • SHA256

      dbc77d91f4364c8ebf577f41405a1969203092f1cc69d984940c2ba7bf541113

    • SHA512

      e8845b07917f61bab64395cbb69da1237669082fae2ec478da3ed4de27480fa14b0b9e40fa3ccaf5ad816efbb8d71644e53b61748fa3fd9f33a0d2b6d5e028e5

    • SSDEEP

      6291456:lnV+k6bAnEDrT9MJVeTJ3JkUnU1GFc9EuyiWBlMU6cgnnE:lnVesnEj9MJkTDNnkk7uWrR56E

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

7
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

6
T1082

Tasks