General

  • Target

    file.exe

  • Size

    3.5MB

  • Sample

    240922-qectza1emc

  • MD5

    0ce7cf7cb9d41ae3d473c334443c7293

  • SHA1

    c3be94cd8c7b4122bcd74c3cd9c3bcea15170c24

  • SHA256

    f093c3d6caae966180b506123ceba03a980cee862c6d27ccf1cbc31a4803ad8c

  • SHA512

    a09d2be3e7693ccf1f1b6c95a61b5aa2f2b0f3565175fcc326da746a5982a45934dc6923b2837361c33b1c25ae6629e21a4e889a9d3faa96f93d332d7219d6bd

  • SSDEEP

    49152:mPLdm1zaOSAlDfevZhs2H4mFY0JO6sxnm4USW283JR1eXfzS1p/CvZsDKa70tjDq:KOrevZWQ40Y0em43H0rWfz8PKO0tq

Malware Config

Extracted

Family

vidar

Version

11

Botnet

91ac6183dbe67a7c09b11e88fb5493b8

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      file.exe

    • Size

      3.5MB

    • MD5

      0ce7cf7cb9d41ae3d473c334443c7293

    • SHA1

      c3be94cd8c7b4122bcd74c3cd9c3bcea15170c24

    • SHA256

      f093c3d6caae966180b506123ceba03a980cee862c6d27ccf1cbc31a4803ad8c

    • SHA512

      a09d2be3e7693ccf1f1b6c95a61b5aa2f2b0f3565175fcc326da746a5982a45934dc6923b2837361c33b1c25ae6629e21a4e889a9d3faa96f93d332d7219d6bd

    • SSDEEP

      49152:mPLdm1zaOSAlDfevZhs2H4mFY0JO6sxnm4USW283JR1eXfzS1p/CvZsDKa70tjDq:KOrevZWQ40Y0em43H0rWfz8PKO0tq

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks