General

  • Target

    99ef461bc750761a9fd872d354f234823ee68911ced1df1475a8c1d83c3df10c

  • Size

    2.2MB

  • Sample

    240625-yrdwsssdmr

  • MD5

    3e8ebeffaa6b46887d4e463a2860467b

  • SHA1

    e380e75fe571a48ab039ae7789689a6e54204803

  • SHA256

    99ef461bc750761a9fd872d354f234823ee68911ced1df1475a8c1d83c3df10c

  • SHA512

    4328848e16f8f6f4c2addae454540679d40adba34ad330be1f26ea9b94d5a0e8ae7022d99065d454aaee75c8eb2f599da0466b76817a30576c6165383cef2d96

  • SSDEEP

    49152:lAgY7fvVtbBaxmcqMTBeW0KQl+bH4JbjzzEBETT29YMST:llY7nTMBTBeW0KQl+bYxzIBA6uMST

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      99ef461bc750761a9fd872d354f234823ee68911ced1df1475a8c1d83c3df10c

    • Size

      2.2MB

    • MD5

      3e8ebeffaa6b46887d4e463a2860467b

    • SHA1

      e380e75fe571a48ab039ae7789689a6e54204803

    • SHA256

      99ef461bc750761a9fd872d354f234823ee68911ced1df1475a8c1d83c3df10c

    • SHA512

      4328848e16f8f6f4c2addae454540679d40adba34ad330be1f26ea9b94d5a0e8ae7022d99065d454aaee75c8eb2f599da0466b76817a30576c6165383cef2d96

    • SSDEEP

      49152:lAgY7fvVtbBaxmcqMTBeW0KQl+bH4JbjzzEBETT29YMST:llY7nTMBTBeW0KQl+bYxzIBA6uMST

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks