General

  • Target

    b832829177dcfb2f224062fdf796ffdce054c66ac391d4a2efdec7e06aeb69ee

  • Size

    403KB

  • Sample

    240926-26ryrashjk

  • MD5

    80729909b073a23f2caf883d9b9dce98

  • SHA1

    cf621df3f09b1103e247e1292e6c9d4894e90d92

  • SHA256

    b832829177dcfb2f224062fdf796ffdce054c66ac391d4a2efdec7e06aeb69ee

  • SHA512

    e197b71e9b91aa83f6ff0ca454a8ea72c66043449901595613d4d6ad8ac0e007e7ed10c6b1a428692eb6d2a29fd114b0afcfe7a678b6fb11b475ea6fb5ce0b05

  • SSDEEP

    6144:E9rIJUWYO5Mge78Vh5bbBUey+J8f8IztggcO6T4++1dJBMD8tCQSexEO:EiJUWR5MgeChxBUew0IztgO1XJiDYhEO

Malware Config

Extracted

Family

vidar

Version

11

Botnet

3a15237aa92dcd8ccca447211fb5fc2a

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      b832829177dcfb2f224062fdf796ffdce054c66ac391d4a2efdec7e06aeb69ee

    • Size

      403KB

    • MD5

      80729909b073a23f2caf883d9b9dce98

    • SHA1

      cf621df3f09b1103e247e1292e6c9d4894e90d92

    • SHA256

      b832829177dcfb2f224062fdf796ffdce054c66ac391d4a2efdec7e06aeb69ee

    • SHA512

      e197b71e9b91aa83f6ff0ca454a8ea72c66043449901595613d4d6ad8ac0e007e7ed10c6b1a428692eb6d2a29fd114b0afcfe7a678b6fb11b475ea6fb5ce0b05

    • SSDEEP

      6144:E9rIJUWYO5Mge78Vh5bbBUey+J8f8IztggcO6T4++1dJBMD8tCQSexEO:EiJUWR5MgeChxBUew0IztgO1XJiDYhEO

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks