General

  • Target

    d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8

  • Size

    4.5MB

  • Sample

    241007-w95fcs1erk

  • MD5

    d05c9d75442d9ce316c4705ef85f5f87

  • SHA1

    f1b231d829bfc9603eab7c23cd345a2b89ccb2cf

  • SHA256

    d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8

  • SHA512

    f8202c9c84596f764e448c694e92861be19ad12f3163de92471b9082146dca5b2f44fb5f0ea6173cd1a69ee29e41d9cac53e6a6f89dc9c775e678d0035296a58

  • SSDEEP

    98304:gbz071DTleKHsJ5MZux2G/rKJnMLEsrlIevc:u071D1Ho5SGeJMosxIyc

Malware Config

Extracted

Family

vidar

Version

10.7

Botnet

a01c5a6c1bbc3b92c22a5d21b8548a3a

C2

https://steamcommunity.com/profiles/76561199751190313

https://t.me/pech0nk

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Targets

    • Target

      d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8

    • Size

      4.5MB

    • MD5

      d05c9d75442d9ce316c4705ef85f5f87

    • SHA1

      f1b231d829bfc9603eab7c23cd345a2b89ccb2cf

    • SHA256

      d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8

    • SHA512

      f8202c9c84596f764e448c694e92861be19ad12f3163de92471b9082146dca5b2f44fb5f0ea6173cd1a69ee29e41d9cac53e6a6f89dc9c775e678d0035296a58

    • SSDEEP

      98304:gbz071DTleKHsJ5MZux2G/rKJnMLEsrlIevc:u071D1Ho5SGeJMosxIyc

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks