General

  • Target

    87c76b5e77bf00e73d34c2bc161bd3c3ea1f14d1c72cc3c9c4522cb252b2e11e

  • Size

    2.2MB

  • Sample

    240625-r7qf7swdra

  • MD5

    9818ece207fa1eab7be1759e55706f0b

  • SHA1

    3709efb668d404ff3e471d91f2beb2a1db0a4ef3

  • SHA256

    87c76b5e77bf00e73d34c2bc161bd3c3ea1f14d1c72cc3c9c4522cb252b2e11e

  • SHA512

    6c293db5d1738eb6f560e89d581f8243083044095e295c302549b3fa7ca85b1b811d2c06821c49d225280daea58f93f995030c4ac1e2feeed3e0e59c1b615d45

  • SSDEEP

    49152:lAgY7fvVtbBaxmcqMTBemQKQl+bH4JbjzzEBETT29YMST:llY7nTMBTBemQKQl+bYxzIBA6uMST

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      87c76b5e77bf00e73d34c2bc161bd3c3ea1f14d1c72cc3c9c4522cb252b2e11e

    • Size

      2.2MB

    • MD5

      9818ece207fa1eab7be1759e55706f0b

    • SHA1

      3709efb668d404ff3e471d91f2beb2a1db0a4ef3

    • SHA256

      87c76b5e77bf00e73d34c2bc161bd3c3ea1f14d1c72cc3c9c4522cb252b2e11e

    • SHA512

      6c293db5d1738eb6f560e89d581f8243083044095e295c302549b3fa7ca85b1b811d2c06821c49d225280daea58f93f995030c4ac1e2feeed3e0e59c1b615d45

    • SSDEEP

      49152:lAgY7fvVtbBaxmcqMTBemQKQl+bH4JbjzzEBETT29YMST:llY7nTMBTBemQKQl+bYxzIBA6uMST

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks