General

  • Target

    file.exe

  • Size

    282KB

  • Sample

    240913-l7c8zsxdnr

  • MD5

    a34d7daa11a8fec34b5d435f2915b4e3

  • SHA1

    4eb5f71cbe7f5c4a0cf45a024a73e722b559833b

  • SHA256

    b10d3a615a6fb0971d10d6e853977f6c4b80a2085732e8273b363c2efa21aa9f

  • SHA512

    048edabc8433df162e3590a210b1bbae97db0d3dd0f77ed55d74292e7f72e142462919412dfb8e849ae0fc48170795ba15c2cde99ee4709308e434ef2f370701

  • SSDEEP

    6144:LnP22RU3G8V6uctgRgnllTLaHh95tjdB/sZe5rompXUDEO:jP25WLvtnllfaB9XxIe5rocXEEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Targets

    • Target

      file.exe

    • Size

      282KB

    • MD5

      a34d7daa11a8fec34b5d435f2915b4e3

    • SHA1

      4eb5f71cbe7f5c4a0cf45a024a73e722b559833b

    • SHA256

      b10d3a615a6fb0971d10d6e853977f6c4b80a2085732e8273b363c2efa21aa9f

    • SHA512

      048edabc8433df162e3590a210b1bbae97db0d3dd0f77ed55d74292e7f72e142462919412dfb8e849ae0fc48170795ba15c2cde99ee4709308e434ef2f370701

    • SSDEEP

      6144:LnP22RU3G8V6uctgRgnllTLaHh95tjdB/sZe5rompXUDEO:jP25WLvtnllfaB9XxIe5rocXEEO

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks