General

  • Target

    23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f

  • Size

    2.2MB

  • Sample

    240628-y5h3ns1cnf

  • MD5

    094e08b1acd4b7741ba403cc7b1d9e19

  • SHA1

    f905d872a8f2132e518570c7536042d02cce0cc0

  • SHA256

    23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f

  • SHA512

    1868d043be07fa9b7fe1286ba0ec61fe2faf43baaaa85d50b7c37c78b08f081fb300de80e1479ccdd285844542a1b62ad98ea0329ccffbed44bc9ec5e1e1b831

  • SSDEEP

    49152:qpjNvr9ySAOmw4NHHO+SASagXkJr4MDkUwm:qpjNp7p4NHH8n5A

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f

    • Size

      2.2MB

    • MD5

      094e08b1acd4b7741ba403cc7b1d9e19

    • SHA1

      f905d872a8f2132e518570c7536042d02cce0cc0

    • SHA256

      23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f

    • SHA512

      1868d043be07fa9b7fe1286ba0ec61fe2faf43baaaa85d50b7c37c78b08f081fb300de80e1479ccdd285844542a1b62ad98ea0329ccffbed44bc9ec5e1e1b831

    • SSDEEP

      49152:qpjNvr9ySAOmw4NHHO+SASagXkJr4MDkUwm:qpjNp7p4NHH8n5A

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks