General

  • Target

    dadb65e7cb78e85a35ed4d0c1f4a5483_JaffaCakes118

  • Size

    448KB

  • Sample

    240911-vzqc1ssgrq

  • MD5

    dadb65e7cb78e85a35ed4d0c1f4a5483

  • SHA1

    0fb4e5ed201a5ca2317841b8280f179806e011b7

  • SHA256

    dd32b0d06490ef200817a5e69a2fad072b8df1d12ef87607c3740f818a10ea43

  • SHA512

    7dd6312e35bf7e181dfb6decffd04b70090a0356d2ef4226cef61224ff71de80b76c2c23f0ec5f2a26839e54d0a04246938e030e528358aa7d82e1c035d40be9

  • SSDEEP

    6144:W1Te1y1TNPl1ny4xci6HDxWe9XPw0XB+/Svnv7aazR4w9/UMEU1/kJ2fYZkzM61:iZTNPlxy4axh4WU/SvvY5nUyvG

Malware Config

Extracted

Family

vidar

Version

23.9

Botnet

602

C2

http://maudqueen.com/

Attributes
  • profile_id

    602

Targets

    • Target

      dadb65e7cb78e85a35ed4d0c1f4a5483_JaffaCakes118

    • Size

      448KB

    • MD5

      dadb65e7cb78e85a35ed4d0c1f4a5483

    • SHA1

      0fb4e5ed201a5ca2317841b8280f179806e011b7

    • SHA256

      dd32b0d06490ef200817a5e69a2fad072b8df1d12ef87607c3740f818a10ea43

    • SHA512

      7dd6312e35bf7e181dfb6decffd04b70090a0356d2ef4226cef61224ff71de80b76c2c23f0ec5f2a26839e54d0a04246938e030e528358aa7d82e1c035d40be9

    • SSDEEP

      6144:W1Te1y1TNPl1ny4xci6HDxWe9XPw0XB+/Svnv7aazR4w9/UMEU1/kJ2fYZkzM61:iZTNPlxy4axh4WU/SvvY5nUyvG

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Vidar Stealer

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks