Resubmissions

05-01-2025 19:04

250105-xqxrvavngm 10

05-01-2025 18:50

250105-xhbveaspat 10

05-01-2025 18:38

250105-xaa8xasmby 10

04-01-2025 19:18

250104-xzzb2avmfq 10

02-01-2025 17:37

250102-v7bjtssnej 10

11-12-2024 17:42

241211-v97eaaspes 10

11-12-2024 17:40

241211-v9bbvaxleq 10

01-10-2024 21:39

241001-1h1ejs1hkq 10

29-08-2024 12:54

240829-p5n49avaqp 10

Analysis

  • max time kernel
    20s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 09:57

General

  • Target

    66bddfcb52736_vidar.exe

  • Size

    190KB

  • MD5

    fedb687ed23f77925b35623027f799bb

  • SHA1

    7f27d0290ecc2c81bf2b2d0fa1026f54fd687c81

  • SHA256

    325396d5ffca8546730b9a56c2d0ed99238d48b5e1c3c49e7d027505ea13b8d1

  • SHA512

    6d1fa39560f4d7ca57905bc57d615acf96b1ef69ca2a4d7c0353278e8d4466298ed87f514463c49d671cb0e3b6a269a78636a10a1e463dba5c83fe067dc5df18

  • SSDEEP

    3072:XqsEJybpRHuJKKBardRei4UGvI96/ZO6RAkeOCeP9sZy28se:XqsMyNRHuKikUi42KZO6PffmZy2d

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199751190313

https://t.me/pech0nk

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe
    "C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:348
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\ProgramData\EBAFHCBFHD.exe
        "C:\ProgramData\EBAFHCBFHD.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1068
      • C:\ProgramData\EGIDBFBFHJ.exe
        "C:\ProgramData\EGIDBFBFHJ.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1972
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:1512
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GCBKFBFCGIEH" & exit
          3⤵
            PID:2352
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              4⤵
              • Delays execution with timeout.exe
              PID:1884

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        decc5325c567d58645388ce7cfca1e06

        SHA1

        1c0bfb95dc7f9e7d73fc6705ce23cd6395033ba8

        SHA256

        f03535efb3e744eb9cd75e6d8f127feeff280393ec6f9e23a758921c9a8c6d62

        SHA512

        427beab3169a4ba9ed6da609fb6e172b6294dea8d4bbb0b54fcf50ca9e843275fcccb801cea07fff06e9d0b3a2cae046f40291a375abc0a8cb4eaf7dad0b2407

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        f86c0d66f28b1f862ae1b9bdc2a7fe51

        SHA1

        70d56ff671be2089a1197baa52fd6d4b85a773a7

        SHA256

        570fbd549b268ebc8e768270e3fafe21e166ba7f8de26ef062a5386d39e31ec7

        SHA512

        501cddd89903ab297301fac89ffd619bb755c63ff530ecc82fc225ad3ae5d17b1d50345fd0c62714dd0b77afeffeaafee080f1f90bae623c708f38f0f7eba49c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\76561199751190313[1].htm

        Filesize

        33KB

        MD5

        45f82bb61755caff87619a5ec9081787

        SHA1

        c3863c48b863fa29e1af4c530eb9faaf10356ab9

        SHA256

        d30f5603ea87bda48476f36a59664c1b77ddb60781da7fb7f6e1c1fa61772b05

        SHA512

        11ab9a6952dc6360fd198725f89c30868c8cf9cc0775e902fdde44ef5aa58fad798191ce32413c3f4f074240d8c86bd261a4e8bf6a91d7a06412b060c1c33418

      • C:\Users\Admin\AppData\Local\Temp\CabE10E.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarE14F.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • \ProgramData\EBAFHCBFHD.exe

        Filesize

        190KB

        MD5

        fedb687ed23f77925b35623027f799bb

        SHA1

        7f27d0290ecc2c81bf2b2d0fa1026f54fd687c81

        SHA256

        325396d5ffca8546730b9a56c2d0ed99238d48b5e1c3c49e7d027505ea13b8d1

        SHA512

        6d1fa39560f4d7ca57905bc57d615acf96b1ef69ca2a4d7c0353278e8d4466298ed87f514463c49d671cb0e3b6a269a78636a10a1e463dba5c83fe067dc5df18

      • \ProgramData\EGIDBFBFHJ.exe

        Filesize

        276KB

        MD5

        a2fb40daa2aae2b589e7338057471282

        SHA1

        8b10a7281f347aa862f365b5bca41c87a8be472c

        SHA256

        409f89268972ae1bff240cc395cc31a3b3876b96f4d6e56fcc5fef74001fcf27

        SHA512

        48daa8f783b24451082c4c339e9f3f704037f89632b55ebf3b6d5b13a85f077785a8ff60f5d35eed8e03fc90543ec5df1b3a1e0dcdf60b7de5a0dc704ffac22a

      • \ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • \ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • memory/348-21-0x0000000074040000-0x000000007472E000-memory.dmp

        Filesize

        6.9MB

      • memory/348-8-0x0000000074040000-0x000000007472E000-memory.dmp

        Filesize

        6.9MB

      • memory/348-0-0x000000007404E000-0x000000007404F000-memory.dmp

        Filesize

        4KB

      • memory/348-1-0x00000000013A0000-0x00000000013D6000-memory.dmp

        Filesize

        216KB

      • memory/1068-669-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1068-454-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1068-706-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1068-725-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1068-744-0x0000000020170000-0x00000000203CF000-memory.dmp

        Filesize

        2.4MB

      • memory/1068-774-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1068-754-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1512-507-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1512-505-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1512-502-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1512-500-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1512-494-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1512-498-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1512-496-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1624-436-0x0000000072BCE000-0x0000000072BCF000-memory.dmp

        Filesize

        4KB

      • memory/1624-437-0x0000000001290000-0x00000000012C6000-memory.dmp

        Filesize

        216KB

      • memory/1624-453-0x0000000072BC0000-0x00000000732AE000-memory.dmp

        Filesize

        6.9MB

      • memory/1624-455-0x0000000072BC0000-0x00000000732AE000-memory.dmp

        Filesize

        6.9MB

      • memory/1972-491-0x0000000000A40000-0x0000000000A8C000-memory.dmp

        Filesize

        304KB

      • memory/2504-11-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-377-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-358-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-227-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-208-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-193-0x0000000020220000-0x000000002047F000-memory.dmp

        Filesize

        2.4MB

      • memory/2504-183-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-155-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-5-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-544-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-563-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-18-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-6-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-7-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-9-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2504-20-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-15-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2504-4-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB