General

  • Target

    #!SetUp_55714--!PassW0rdz#$$.zip

  • Size

    13.4MB

  • Sample

    240629-ptasgs1ajl

  • MD5

    549c9770ad2428d79e579c0043dbd6d0

  • SHA1

    7b1a84f66c6c29c557df0dd6da25a34ee9856f48

  • SHA256

    db2aa4391dc953e0f04beb01d7f25fa3e3927de6e3e83ee4f83831b7f2e83caf

  • SHA512

    e168938ad643bc74c3b06583fe862c59039b0c44a7bacec283c97994a1b5d6ba7d42530d5ad8696f0d1c99c6f5be5fa6f7e844d3950a08b88df25e0361d11e02

  • SSDEEP

    196608:/+1UIYxxALKn+DZLAkGe7mqF7YKF68JlIKNE7kd+UcRELUxFvY7PhBS4G7sWxJcT:bxAtDBA07mq9YKEEeKO0jbUxFQzhalVQ

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      Setup.exe

    • Size

      675.6MB

    • MD5

      acc3282f8baa586c256c7c1b6ff4522c

    • SHA1

      463d8ed383ad2a36a9df93dfefa493a2a95f4445

    • SHA256

      2d4a3b606626c54ef71e06abab01fb69a3ff26e8c7d5322c12511e5d8bd52dc4

    • SHA512

      e9e7321bde05e5e0f882bdd99695990dae509c24a168f017f8b83b332d350d8662e81bc380cae64730d9eeb6bccbd6a2c2a6a6aedace7a51483b4251a49ca2ed

    • SSDEEP

      196608:i0bq45mmYPrOLaxhWJVXdgvY23Jj/W5PCtLwFRpeZApj6bZy3yIhoR0LrLBsyyS3:bbq4o3jOLaSbKY2N/6CNyRp9j6bI

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks