General

  • Target

    c5b7b47009d2df885c7dfa88ed4b951418b2afe40856ea8f15b3e3609ad18968

  • Size

    551KB

  • Sample

    241004-yzpm9sydnd

  • MD5

    10bf19db275e6c6dabfaab5b41b4afdd

  • SHA1

    83604c7f242fc1aee6b1b7d51dc2381620071a86

  • SHA256

    c5b7b47009d2df885c7dfa88ed4b951418b2afe40856ea8f15b3e3609ad18968

  • SHA512

    78749ed6f9cf338abdd41f24124c8520fb3ea15fc5e3423f12e7a2945afd820aebe5aeffa297abbd66d4f6a0a6fe830daa64a0ffefad2798886cf509a8b6ad69

  • SSDEEP

    12288:PSD3oZTCvhjUk9mIRMUwKR/R7WZyDUu8DEZ92zpbkb5klkV+sP:PECctsIRMiRp7WyX83zJkqlkVr

Score
10/10

Malware Config

Extracted

Family

vidar

C2

http://proxy.johnmccrea.com/

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      c5b7b47009d2df885c7dfa88ed4b951418b2afe40856ea8f15b3e3609ad18968

    • Size

      551KB

    • MD5

      10bf19db275e6c6dabfaab5b41b4afdd

    • SHA1

      83604c7f242fc1aee6b1b7d51dc2381620071a86

    • SHA256

      c5b7b47009d2df885c7dfa88ed4b951418b2afe40856ea8f15b3e3609ad18968

    • SHA512

      78749ed6f9cf338abdd41f24124c8520fb3ea15fc5e3423f12e7a2945afd820aebe5aeffa297abbd66d4f6a0a6fe830daa64a0ffefad2798886cf509a8b6ad69

    • SSDEEP

      12288:PSD3oZTCvhjUk9mIRMUwKR/R7WZyDUu8DEZ92zpbkb5klkV+sP:PECctsIRMiRp7WyX83zJkqlkVr

    Score
    10/10
    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks