General

  • Target

    89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10.exe

  • Size

    8.2MB

  • Sample

    240923-n8pphswcmr

  • MD5

    0bb9a4d6bf434b93536ca55dde4f775b

  • SHA1

    91d31cafd3efb9dbefd5955f3f22f766ee9e762a

  • SHA256

    89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10

  • SHA512

    4e834b05000327afb70852c1f0badf2d75789b94ff89bd3352c8afdc3e509c8de349cbb3a818ef8cfef06d1a668e9c32874998b987cefc1d1fc2645263bd25ec

  • SSDEEP

    196608:AEhu47LqGzJGeFdJJMGHPP/CPZ5za/+qKcDxNY5fv7RFHnTKm:xhbzzQeFV/m5zQAfHHTF

Malware Config

Extracted

Family

vidar

Version

11

Botnet

91ac6183dbe67a7c09b11e88fb5493b8

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10.exe

    • Size

      8.2MB

    • MD5

      0bb9a4d6bf434b93536ca55dde4f775b

    • SHA1

      91d31cafd3efb9dbefd5955f3f22f766ee9e762a

    • SHA256

      89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10

    • SHA512

      4e834b05000327afb70852c1f0badf2d75789b94ff89bd3352c8afdc3e509c8de349cbb3a818ef8cfef06d1a668e9c32874998b987cefc1d1fc2645263bd25ec

    • SSDEEP

      196608:AEhu47LqGzJGeFdJJMGHPP/CPZ5za/+qKcDxNY5fv7RFHnTKm:xhbzzQeFV/m5zQAfHHTF

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks