General

  • Target

    66b5ace3a06b0_dozkey.exe

  • Size

    6.1MB

  • Sample

    240828-1d8kcsxckd

  • MD5

    1971d66193a4acc5be2af2c1d34c2d4d

  • SHA1

    e33f7bfb8aa73f1674e141590bfb823d0545312f

  • SHA256

    6ae1ebeb88e73be3fd5141deb9e85ed84203af1ef50cea7f2efc6be74816e52e

  • SHA512

    5e1d5b88035b183ac51dba94861bd95fc593c879cd6c5156b0e9e61c7af80aea8549ab623fa54ea7c33a60ce4843f7c0dfe9f834da00c7c885ee1bb7996416ed

  • SSDEEP

    98304:R5jFPIOFO/utnLvigHc5wqBg+HVkgq2KJ6l91N56OLyl:R5jNfnjPgBTBKM56yyl

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199751190313

https://t.me/pech0nk

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Targets

    • Target

      66b5ace3a06b0_dozkey.exe

    • Size

      6.1MB

    • MD5

      1971d66193a4acc5be2af2c1d34c2d4d

    • SHA1

      e33f7bfb8aa73f1674e141590bfb823d0545312f

    • SHA256

      6ae1ebeb88e73be3fd5141deb9e85ed84203af1ef50cea7f2efc6be74816e52e

    • SHA512

      5e1d5b88035b183ac51dba94861bd95fc593c879cd6c5156b0e9e61c7af80aea8549ab623fa54ea7c33a60ce4843f7c0dfe9f834da00c7c885ee1bb7996416ed

    • SSDEEP

      98304:R5jFPIOFO/utnLvigHc5wqBg+HVkgq2KJ6l91N56OLyl:R5jNfnjPgBTBKM56yyl

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks