General

  • Target

    e0f1b468770374dc01046cd48f25609b5e04724a79323a049f02673ea0bcc811.exe

  • Size

    403KB

  • Sample

    240927-b96yzayhjq

  • MD5

    e02a6087d9257c00071b3cc1508a95ef

  • SHA1

    8081f2bd757d470e08711133cfb7a4ca17f2fb1f

  • SHA256

    e0f1b468770374dc01046cd48f25609b5e04724a79323a049f02673ea0bcc811

  • SHA512

    51bf529586489576b9c1f4fc204dc15328a30a929f8d96c47bd13fe04f8aab43b45ba53352818b26af3f20d5ca86c6b7ec4f9bb750052b2b079a079092830fbc

  • SSDEEP

    12288:mo5mDRjeDmJaLmihjPYAGBJMJuydlSJstPJYHH0fwsMMGEO:mlRWlLmMjPYAGzuldsncwzBt

Malware Config

Extracted

Family

vidar

Version

11

Botnet

6c8ce6f422a1d9cf34f23d1c2168e754

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      e0f1b468770374dc01046cd48f25609b5e04724a79323a049f02673ea0bcc811.exe

    • Size

      403KB

    • MD5

      e02a6087d9257c00071b3cc1508a95ef

    • SHA1

      8081f2bd757d470e08711133cfb7a4ca17f2fb1f

    • SHA256

      e0f1b468770374dc01046cd48f25609b5e04724a79323a049f02673ea0bcc811

    • SHA512

      51bf529586489576b9c1f4fc204dc15328a30a929f8d96c47bd13fe04f8aab43b45ba53352818b26af3f20d5ca86c6b7ec4f9bb750052b2b079a079092830fbc

    • SSDEEP

      12288:mo5mDRjeDmJaLmihjPYAGBJMJuydlSJstPJYHH0fwsMMGEO:mlRWlLmMjPYAGzuldsncwzBt

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks