General

  • Target

    652e3aa6257d354fc3f8093a65757557941ee488b6b7e4a3ac85662208f6d465N

  • Size

    571KB

  • Sample

    241010-3taz5stble

  • MD5

    0b237f48744e67912ad1fb95aafaa3d0

  • SHA1

    9ee0b6e8d6f81a26493a0f97018c0b1b4b74652a

  • SHA256

    652e3aa6257d354fc3f8093a65757557941ee488b6b7e4a3ac85662208f6d465

  • SHA512

    feb3820bbcd889ea7c3dc7561aabb2f5f19f2e31273e0e06926e51aa8ba59d148260d7681700a144ae299411706e99461b1671f06b1f725ca11da8e903734df3

  • SSDEEP

    12288:qpoEhvQ9zc7oU/V5NLFga2/cdQaX99j16C1JtL9LwZ6BDypu5TL+6a4S:qXvQQ5/24X1vvthy6BGpuY67

Malware Config

Extracted

Family

vidar

Botnet

4a5bc8b73e12425adc3c399da8136891

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      652e3aa6257d354fc3f8093a65757557941ee488b6b7e4a3ac85662208f6d465N

    • Size

      571KB

    • MD5

      0b237f48744e67912ad1fb95aafaa3d0

    • SHA1

      9ee0b6e8d6f81a26493a0f97018c0b1b4b74652a

    • SHA256

      652e3aa6257d354fc3f8093a65757557941ee488b6b7e4a3ac85662208f6d465

    • SHA512

      feb3820bbcd889ea7c3dc7561aabb2f5f19f2e31273e0e06926e51aa8ba59d148260d7681700a144ae299411706e99461b1671f06b1f725ca11da8e903734df3

    • SSDEEP

      12288:qpoEhvQ9zc7oU/V5NLFga2/cdQaX99j16C1JtL9LwZ6BDypu5TL+6a4S:qXvQQ5/24X1vvthy6BGpuY67

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks