General

  • Target

    d0e75a424812f8b899626795c8b929c40fdcbf09a0b7445d159f82256b896acf.exe

  • Size

    1.1MB

  • Sample

    241004-sbn4yavajf

  • MD5

    dcf197da548e85d911ce6d40222b3592

  • SHA1

    2b5e353c214eaa0bbd7adfe00ff4c9f1cf9467ae

  • SHA256

    d0e75a424812f8b899626795c8b929c40fdcbf09a0b7445d159f82256b896acf

  • SHA512

    26f28dd0f88c5f912b29495912eecc06cfcdb000a591b6a53cf85c6000c3e3dbad871750b7d4167e1657044c3efdc8576d0b3b5512814991c9d0f7c7d9ba0ef3

  • SSDEEP

    24576:ynY49QOH6CG9C4iF2QyxdipXdbJDNPF1jskplLqh:+9Qe6Q5eqXdzjso+

Malware Config

Extracted

Family

vidar

Version

11

Botnet

8804a4f27e22750a8baa49e881ddca35

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      d0e75a424812f8b899626795c8b929c40fdcbf09a0b7445d159f82256b896acf.exe

    • Size

      1.1MB

    • MD5

      dcf197da548e85d911ce6d40222b3592

    • SHA1

      2b5e353c214eaa0bbd7adfe00ff4c9f1cf9467ae

    • SHA256

      d0e75a424812f8b899626795c8b929c40fdcbf09a0b7445d159f82256b896acf

    • SHA512

      26f28dd0f88c5f912b29495912eecc06cfcdb000a591b6a53cf85c6000c3e3dbad871750b7d4167e1657044c3efdc8576d0b3b5512814991c9d0f7c7d9ba0ef3

    • SSDEEP

      24576:ynY49QOH6CG9C4iF2QyxdipXdbJDNPF1jskplLqh:+9Qe6Q5eqXdzjso+

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks