General

  • Target

    9b645f570116d3e10faa316981e4fcde6fe55417feced3385cfbb815c7df8707.exe

  • Size

    348KB

  • Sample

    240727-b5n8cssakb

  • MD5

    bea49eab907af8ad2cbea9bfb807aae2

  • SHA1

    8efec66e57e052d6392c5cbb7667d1b49e88116e

  • SHA256

    9b645f570116d3e10faa316981e4fcde6fe55417feced3385cfbb815c7df8707

  • SHA512

    59486e18be6b85f5275c19f963d124f4f74c265b5b6dfa78c52f9243e444f40a7747a741ccb59bf1863ffb497321324c803fc967380900a6a2e0219eb99f387c

  • SSDEEP

    3072:oh2eRgJtqxVRGKf8OGiLOnXChCrmqSOLMKTJGlRayuEpZTPckmRmVfL:URRgJtqpGO8OUnrpbMKT0lXZT3p

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199747278259

https://t.me/armad2a

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.1 Safari/537.36

Targets

    • Target

      9b645f570116d3e10faa316981e4fcde6fe55417feced3385cfbb815c7df8707.exe

    • Size

      348KB

    • MD5

      bea49eab907af8ad2cbea9bfb807aae2

    • SHA1

      8efec66e57e052d6392c5cbb7667d1b49e88116e

    • SHA256

      9b645f570116d3e10faa316981e4fcde6fe55417feced3385cfbb815c7df8707

    • SHA512

      59486e18be6b85f5275c19f963d124f4f74c265b5b6dfa78c52f9243e444f40a7747a741ccb59bf1863ffb497321324c803fc967380900a6a2e0219eb99f387c

    • SSDEEP

      3072:oh2eRgJtqxVRGKf8OGiLOnXChCrmqSOLMKTJGlRayuEpZTPckmRmVfL:URRgJtqpGO8OUnrpbMKT0lXZT3p

    • Detect Vidar Stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks