General

  • Target

    file.exe

  • Size

    292KB

  • Sample

    240920-b5tg3ssejg

  • MD5

    82661ca16a1713263f9a11beaf43efee

  • SHA1

    6a86e5b61c134f7db8f50fb17b3ca9e9a2984029

  • SHA256

    f57e57207b27642e6f3e82bc44aa4079f8a1357a8a86341cace885af9cbaf4e6

  • SHA512

    fa370a9c1a22f2025c334e8c781e7e2d94043174e5638b66fdbc62cc51afdb5a03aea9ebee6232d2284c4c4aa406c82598e77c9503e13c578e45620d416dad03

  • SSDEEP

    6144:J+kSx0+OvgVz6/MtajJ4i34rnJMJkBccaJntC8OmkwDDAI7F3EO:LSxJsgg/PjJ4b7JwkBvaJnQTwDDAI7dt

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Targets

    • Target

      file.exe

    • Size

      292KB

    • MD5

      82661ca16a1713263f9a11beaf43efee

    • SHA1

      6a86e5b61c134f7db8f50fb17b3ca9e9a2984029

    • SHA256

      f57e57207b27642e6f3e82bc44aa4079f8a1357a8a86341cace885af9cbaf4e6

    • SHA512

      fa370a9c1a22f2025c334e8c781e7e2d94043174e5638b66fdbc62cc51afdb5a03aea9ebee6232d2284c4c4aa406c82598e77c9503e13c578e45620d416dad03

    • SSDEEP

      6144:J+kSx0+OvgVz6/MtajJ4i34rnJMJkBccaJntC8OmkwDDAI7F3EO:LSxJsgg/PjJ4b7JwkBvaJnQTwDDAI7dt

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks