Resubmissions

23-09-2024 08:38

240923-kjvyfswfqc 3

23-09-2024 08:34

240923-kgrs1swflh 10

General

  • Target

    S0FTWARE.rar

  • Size

    21.6MB

  • Sample

    240923-kgrs1swflh

  • MD5

    14ef0e9fb6ac3dce63e54fd4a181570e

  • SHA1

    b3aaad972fac157757b8531475707fae66466f9a

  • SHA256

    84b59b35d91117b3a3bc6a0fa02a37b0851b82e24c3dc0b6fd4e1a0e1faea39a

  • SHA512

    9ad807f0b0ba60881100f3dbc8154fe66a71d37eceba7e9951bc30c019ae357ffd45d0b39f8ec1314de6655e4a4fdceb2987b99c81343efe885cf0887e7faa83

  • SSDEEP

    393216:SneHT3UHxryteVERmyhf83P1qxmW6VUr9HQwM/iRdYWgc+rGY23MpPUpOzh8Xe/w:PZtAEMyhfmP4wVUr9HQKB8r923uUwzhI

Malware Config

Extracted

Family

vidar

Version

11

Botnet

346a77fbabba142b23c256004b5a7c5d

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      S0FTWARE.exe

    • Size

      18.0MB

    • MD5

      a11bb3b18eba3f07561ca84c92c520cd

    • SHA1

      c09ffdaa9b11747b07e88f669c70566a48134678

    • SHA256

      7cfae4e35c049f4aad444cca84c5fcdd0f4da67b5a1846e821322a9f9757096b

    • SHA512

      108e8153f76adfb5eb840a771b5af0c80396838363add14e05baf1b953ae19a684bed0648c2b4404d23d2a8f9a0ad2968b2f3e6d6a062c462a217a75dd9a85ac

    • SSDEEP

      98304:NnBWTZ3ASa9wYqH4ALpq+yU0VhtDEH1EU/5VY2PJzuaIK:APa9wYqHZE40jtDEmU/5VPH

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks