General

  • Target

    2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0

  • Size

    2.0MB

  • Sample

    240624-k3p7bavarb

  • MD5

    ea9fa7d01bea905b858de54fa01ad7fa

  • SHA1

    26115372eb48ee842ac9b9f0737a98dfe21160ed

  • SHA256

    2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0

  • SHA512

    a0254d601d3fc31ac8a6de2a05daf2442049a7967667e9fddeeda58e43c3166ede189d91bf1d878d2bb55c6aced3bcc22e8c163981d645c99528b15b4ff8f951

  • SSDEEP

    24576:tbTBwmZ33qAioFmymA7mrB6nvBt5v+rpyzzL:F/aPg7KAn5/vapuL

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

1672

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

http://79.124.78.206:80

Attributes
  • profile_id

    1672

Targets

    • Target

      2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0

    • Size

      2.0MB

    • MD5

      ea9fa7d01bea905b858de54fa01ad7fa

    • SHA1

      26115372eb48ee842ac9b9f0737a98dfe21160ed

    • SHA256

      2231160e71faf8674b8efc0cedf3384db3acc5d66f0276c76b18c7cb5f842ce0

    • SHA512

      a0254d601d3fc31ac8a6de2a05daf2442049a7967667e9fddeeda58e43c3166ede189d91bf1d878d2bb55c6aced3bcc22e8c163981d645c99528b15b4ff8f951

    • SSDEEP

      24576:tbTBwmZ33qAioFmymA7mrB6nvBt5v+rpyzzL:F/aPg7KAn5/vapuL

    Score
    10/10
    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      cff85c549d536f651d4fb8387f1976f2

    • SHA1

      d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    • SHA256

      8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    • SHA512

      531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

    • SSDEEP

      192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks