General

  • Target

    f75acf936390f89239c43552717efb65c4c3190b16a7eec62dcd0053a045e91d.exe

  • Size

    403KB

  • Sample

    240927-ccrcpascmh

  • MD5

    2cce29d734ea1d227b338834698e2de4

  • SHA1

    41700cd1bcf5f5bcca81ce722ed47fc17bd030c2

  • SHA256

    f75acf936390f89239c43552717efb65c4c3190b16a7eec62dcd0053a045e91d

  • SHA512

    ea0b440113a225764b38ae2526a10f7e4f3081e4a353e9831cf0e846ac7ba97ea7c2b4a12ab6fac5708a7855da8967f1b6bc661757dc68d819d11887a6af20b5

  • SSDEEP

    6144:O+0dGgr04h1LBuTmcYz43wUDPNvms5PYYzX3oYbEU6DsV4+1/QSyiZEO:30d/h1LBK13wUjx5QYTo0EUBVSS/EO

Malware Config

Extracted

Family

vidar

Version

11

Botnet

e90840a846d017e7b095f7543cdf2d15

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      f75acf936390f89239c43552717efb65c4c3190b16a7eec62dcd0053a045e91d.exe

    • Size

      403KB

    • MD5

      2cce29d734ea1d227b338834698e2de4

    • SHA1

      41700cd1bcf5f5bcca81ce722ed47fc17bd030c2

    • SHA256

      f75acf936390f89239c43552717efb65c4c3190b16a7eec62dcd0053a045e91d

    • SHA512

      ea0b440113a225764b38ae2526a10f7e4f3081e4a353e9831cf0e846ac7ba97ea7c2b4a12ab6fac5708a7855da8967f1b6bc661757dc68d819d11887a6af20b5

    • SSDEEP

      6144:O+0dGgr04h1LBuTmcYz43wUDPNvms5PYYzX3oYbEU6DsV4+1/QSyiZEO:30d/h1LBK13wUjx5QYTo0EUBVSS/EO

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks