General

  • Target

    ac729922425fa88fca620b03a5599bdde53b2b33ce0bcf69797e13089bc07921

  • Size

    2.2MB

  • Sample

    240628-qpyt7a1hrh

  • MD5

    03e91d3940104ab30f6d9b6483a76e66

  • SHA1

    fe4cbefd208c9ceed388ce482e3e2a7e1da0b724

  • SHA256

    ac729922425fa88fca620b03a5599bdde53b2b33ce0bcf69797e13089bc07921

  • SHA512

    5c866a0aad25894e23c7afaedc37853c1522d40a174fce563ba468f0c15b08c3aec5e43630eb5bfefc125eaf11a304146b1694c06373c2273ab187acfd59993d

  • SSDEEP

    49152:qpjNvr9ySAOmw4RHHO+SASagXkJr4MDkUwm:qpjNp7p4RHH8n5A

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      ac729922425fa88fca620b03a5599bdde53b2b33ce0bcf69797e13089bc07921

    • Size

      2.2MB

    • MD5

      03e91d3940104ab30f6d9b6483a76e66

    • SHA1

      fe4cbefd208c9ceed388ce482e3e2a7e1da0b724

    • SHA256

      ac729922425fa88fca620b03a5599bdde53b2b33ce0bcf69797e13089bc07921

    • SHA512

      5c866a0aad25894e23c7afaedc37853c1522d40a174fce563ba468f0c15b08c3aec5e43630eb5bfefc125eaf11a304146b1694c06373c2273ab187acfd59993d

    • SSDEEP

      49152:qpjNvr9ySAOmw4RHHO+SASagXkJr4MDkUwm:qpjNp7p4RHH8n5A

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks