Resubmissions

07-10-2024 16:54

241007-vexllathjc 10

07-10-2024 16:54

241007-vej1hathjb 3

07-10-2024 16:52

241007-vdp55azglq 3

General

  • Target

    tool-downloader.exe

  • Size

    28.3MB

  • Sample

    241007-vexllathjc

  • MD5

    b66b96bc4090e52a953109d80e6dbe6e

  • SHA1

    394d3f05bacb3a6d05ed34fc456bdaef7fc13250

  • SHA256

    360ecf1d1e63ffe40b9a1e2b55344adafe8d0f83b0b1787496b9738422ed1e5f

  • SHA512

    7a9bd0f39f8fb9bf5a00fe12c861a29585a59c6be5097994f703f407e8f3b181a1dbd8c112d59ee88455f9078e72798b96bcd58c613ed9002211ea0266ba2b15

  • SSDEEP

    786432:B1Jw9nyVmzF6N2j6+s7LWB75zuOOoln1JS5dgEDqJ8pGZnt:bInyV+6N2qHWB75i2l1I5d388pGZn

Malware Config

Extracted

Family

vidar

Version

11

Botnet

346a77fbabba142b23c256004b5a7c5d

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      tool-downloader.exe

    • Size

      28.3MB

    • MD5

      b66b96bc4090e52a953109d80e6dbe6e

    • SHA1

      394d3f05bacb3a6d05ed34fc456bdaef7fc13250

    • SHA256

      360ecf1d1e63ffe40b9a1e2b55344adafe8d0f83b0b1787496b9738422ed1e5f

    • SHA512

      7a9bd0f39f8fb9bf5a00fe12c861a29585a59c6be5097994f703f407e8f3b181a1dbd8c112d59ee88455f9078e72798b96bcd58c613ed9002211ea0266ba2b15

    • SSDEEP

      786432:B1Jw9nyVmzF6N2j6+s7LWB75zuOOoln1JS5dgEDqJ8pGZnt:bInyV+6N2qHWB75i2l1I5d388pGZn

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks