General

  • Target

    Unlock_Tool_5.7.rar

  • Size

    43.4MB

  • Sample

    240914-s56k3s1fpn

  • MD5

    031381e252de996606bdb17fa8b3fa08

  • SHA1

    11fe18d38ff3ba3e56f583d027e65d7196de840a

  • SHA256

    b33abedd054f481a526c376ebc61b8eea651f7604645d64df02d981d081f6300

  • SHA512

    825a520b53661fc06f005ea8687d5cb6c63094d14072353b49d28687bfe3d58721e508c881608e4925bc8699603c723fff0b27b5a6ccbea195165bb9b71089e8

  • SSDEEP

    786432:XiTim4ZkI3T1Ssy+rGfTGlSg7ZkbxmSyvnPTuO2+7p37y4tGbV/ZNT1Djn8X21:2iCGy+SfaXZ2dyXiqsOGbVBV1Dj6Q

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Targets

    • Target

      Unlock_Tool_5.7.exe

    • Size

      274KB

    • MD5

      f1fc4857b145c3f406e101e7891e0806

    • SHA1

      aaef6e23757b1a630e4d341b1c0789392e83813b

    • SHA256

      0cda418e296bceda46e5a7b7f89a33acae4ff5c6523c22e82a75c4d26553db3b

    • SHA512

      bd3d9f1b50f27dc2f1ee02756e0e04a3ee319e50697b4beafb7be47a6ebb5bc431ff7ddda9f710ab1c54bb5dcbeed90062995bc0eaf3fbaee0fb3a8ce475d744

    • SSDEEP

      6144:H9BDl2wLHyWeemtO224BD0kc7P5W3w+KJsucPsmVqNvN+c:HjD4E7Jvqp0kc57/cPo

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks