Resubmissions

28/06/2024, 15:06

240628-sg6wyavepf 10

28/06/2024, 14:58

240628-sb53fsxgnj 10

General

  • Target

    !!fUlLSetup_22334_P@ssKeys!!.zip

  • Size

    22.0MB

  • Sample

    240628-sg6wyavepf

  • MD5

    a4e30d8ed94d3e28fd8727e04a203126

  • SHA1

    b052128839bcdbf841da2e4b42c955893adf1b86

  • SHA256

    8506cac9dd95d8779ddbfe185f0f81d0357223724ea4ad8fadeb136c01a82ef8

  • SHA512

    16cdf46220b709e40b2e1618bac59962f9cdf336bdaa250a7c7e7518ae59265a6e2fb7d5232e0f00d34ff95e71dc0d665ec7e8ae5d345b5efbfa302f538bab98

  • SSDEEP

    393216:jIdmIR4XKjsWJxcRGh/vp0cOqFfMLz5MeOF7EGXutGPBSKx6XI3WrBqWP:jMuX1WwRGh/R/ZOz5MLNlPZItlt

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      !!fUlLSetup_22334_P@ssKeys!!/Setup.exe

    • Size

      656.8MB

    • MD5

      a16936abeb9abc4945d6fdd76ecec729

    • SHA1

      a74de976ce3af1db488626afe9796f7f13add504

    • SHA256

      b2300fcaa158d08f4980f4cfe7373848256bd4918384a18e3c32b464add812a7

    • SHA512

      d03704bef171f7815765fb527fa7c1103fdfbdfeaad22eb09b0af893ff1adec9455e7c6629946846be1924e12ac5213f7f467abf0a7276522bccfac3d25f8f44

    • SSDEEP

      196608:doeohPRS9UUoFG2z4wThcbwNq1Af8YOdN6ZLAM4/tS9yS:doeoRao/

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks