General

  • Target

    f581b285f9b3ccee1ab2e7922d2bcdb5_JaffaCakes118

  • Size

    459KB

  • Sample

    240925-jd4sqsshmk

  • MD5

    f581b285f9b3ccee1ab2e7922d2bcdb5

  • SHA1

    f13e00b6cee59788ec01ceb6c6ac5f8b5886d3dd

  • SHA256

    933d5a9b9518536c9714db27d8327d293a2c95f9e05dadec31e7b8f9f830e51b

  • SHA512

    8b76ff81f5660173f81c2c8bb245ae33b8b28265caaa5a22b8939bf6be71211ea67ed9b00934e5e88011d7eef36a0d951531f926c4361ebe8da7e105f8e7fd5e

  • SSDEEP

    6144:UjLMltUEz/YdGvBxKnooF6vCSdsxmbAYZA+9rmzM8:UjwPDEdzog+vVtrI

Malware Config

Extracted

Family

vidar

Version

31

Botnet

517

C2

http://kobinetalos.co.ug/

Attributes
  • profile_id

    517

Targets

    • Target

      f581b285f9b3ccee1ab2e7922d2bcdb5_JaffaCakes118

    • Size

      459KB

    • MD5

      f581b285f9b3ccee1ab2e7922d2bcdb5

    • SHA1

      f13e00b6cee59788ec01ceb6c6ac5f8b5886d3dd

    • SHA256

      933d5a9b9518536c9714db27d8327d293a2c95f9e05dadec31e7b8f9f830e51b

    • SHA512

      8b76ff81f5660173f81c2c8bb245ae33b8b28265caaa5a22b8939bf6be71211ea67ed9b00934e5e88011d7eef36a0d951531f926c4361ebe8da7e105f8e7fd5e

    • SSDEEP

      6144:UjLMltUEz/YdGvBxKnooF6vCSdsxmbAYZA+9rmzM8:UjwPDEdzog+vVtrI

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks