General

  • Target

    177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01

  • Size

    206KB

  • Sample

    240706-1ew8qawcqf

  • MD5

    7debc473f9ec83c3d000a57466eab9b2

  • SHA1

    5dbb4eff8d72becf6d4050a97907a07190e4f6db

  • SHA256

    177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01

  • SHA512

    b6afa39d0ec0bfe7ca626b8952b6a605e4b79476539cd238cc03bac17b42ecd4b420cf34fb2c74cf1557008baa5e32cb876031e1a930875b78162331fbc4dad9

  • SSDEEP

    3072:1TQm3axZbvWtCyEwVt2IUE5iujhGzCLEoFreNsagz6p9ufGol:mmqHbv+EwiIf5ykEoFlMufG

Malware Config

Extracted

Family

vidar

C2

https://t.me/bu77un

https://steamcommunity.com/profiles/76561199730044335

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1

Targets

    • Target

      177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01

    • Size

      206KB

    • MD5

      7debc473f9ec83c3d000a57466eab9b2

    • SHA1

      5dbb4eff8d72becf6d4050a97907a07190e4f6db

    • SHA256

      177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01

    • SHA512

      b6afa39d0ec0bfe7ca626b8952b6a605e4b79476539cd238cc03bac17b42ecd4b420cf34fb2c74cf1557008baa5e32cb876031e1a930875b78162331fbc4dad9

    • SSDEEP

      3072:1TQm3axZbvWtCyEwVt2IUE5iujhGzCLEoFreNsagz6p9ufGol:mmqHbv+EwiIf5ykEoFlMufG

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks