General

  • Target

    f33b34d0de9bb27980bc99ea468c1181.bin

  • Size

    276KB

  • Sample

    240913-cbg3maydja

  • MD5

    acc978d20acfcf54b443523a7d4343aa

  • SHA1

    0d6192e7ab4751412e996ecc6db70ef24d8ad861

  • SHA256

    dbe2da1c659d176639c94fa2282d45d968dd1f6d55a51209981ac9ed3083198f

  • SHA512

    a5061afe016c457948766aa2617027a3d387afde7353eb81f200d0e12ed4d325fe9b6b42d8a91c1cd89cc2f82d2855cd08ec058a1d495945c367c1d97daf22c2

  • SSDEEP

    6144:HlpRmfPh8eanyr67A1aUqGpirWpTqSuEjLOmtYL4ACd7YoIe:HlTmaznyr4AxSrWsSuEjLOBL4hdbIe

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Targets

    • Target

      6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e.exe

    • Size

      282KB

    • MD5

      f33b34d0de9bb27980bc99ea468c1181

    • SHA1

      b6ddd17ceed5372febacae3d2c3b95165053fc62

    • SHA256

      6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e

    • SHA512

      e6a7083752cafcc5264ee312cc4804b646c5f9788c24905a7df689c1520552b73ebc04ff1af5ef0c0c93c026cc3249738fa194caef75ba2f9af7ea1a3f72545e

    • SSDEEP

      6144:Ms6bXo+ImXuZeO59j7MLE/Ut67PmromTk8uHc+1BagPivpNEO:MnbLBXkZ7Bc67PmkR2g6/EO

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks