General

  • Target

    file.exe

  • Size

    283KB

  • Sample

    240916-rbkwva1ejb

  • MD5

    0d2bcf6e8f35ef48b85b997e23fbec5f

  • SHA1

    3d1bac7342eff07e1f5682e7ad591f0be2eff9d4

  • SHA256

    434f2dc20a710077ba861c9a118223c51f04662d6edcb492812c6468e4cede48

  • SHA512

    3be9df19930613b864daa5f903dafddad3e758fe4cf8863b69b7b43a7b3222601800543b7c8d0ef8063a3e01af702a1bd04f04edb391091314f10d5f98861350

  • SSDEEP

    6144:AA0VuptENYAdPF3ghtSgrFk0ynrSmOoFiY8+bXU9eNqgzdsq7JEO:HaupqNYAdd30cgafO0FigEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Targets

    • Target

      file.exe

    • Size

      283KB

    • MD5

      0d2bcf6e8f35ef48b85b997e23fbec5f

    • SHA1

      3d1bac7342eff07e1f5682e7ad591f0be2eff9d4

    • SHA256

      434f2dc20a710077ba861c9a118223c51f04662d6edcb492812c6468e4cede48

    • SHA512

      3be9df19930613b864daa5f903dafddad3e758fe4cf8863b69b7b43a7b3222601800543b7c8d0ef8063a3e01af702a1bd04f04edb391091314f10d5f98861350

    • SSDEEP

      6144:AA0VuptENYAdPF3ghtSgrFk0ynrSmOoFiY8+bXU9eNqgzdsq7JEO:HaupqNYAdd30cgafO0FigEO

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks