General

  • Target

    ca557726088cb7863a06899ffbc19e210d8974bca556a37ba49a6b1feacc1ddc

  • Size

    598KB

  • Sample

    241011-c5sq8a1epf

  • MD5

    b6fb1cce0cc68e5db043b7a9a3cd83b6

  • SHA1

    664fdf69f500fd684774707087739412484383a4

  • SHA256

    ca557726088cb7863a06899ffbc19e210d8974bca556a37ba49a6b1feacc1ddc

  • SHA512

    525a2e82f9152664fb02892ab41e09d60a5926edcea56548daf73b0a46e95f8c70994525779d69d0df61774e7de1a098b7aa9605bd4ad3c521277378f7f79189

  • SSDEEP

    12288:3MmEES7ltqOXyVhDF2seW5pQdG4KHRIuI5GW+NExAHReitk64fEETEO:3M7P7luFBn5aITI5h+Nddxlmt

Malware Config

Extracted

Family

vidar

Botnet

5d5c21db908d8fe19952873f9f748174

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      ca557726088cb7863a06899ffbc19e210d8974bca556a37ba49a6b1feacc1ddc

    • Size

      598KB

    • MD5

      b6fb1cce0cc68e5db043b7a9a3cd83b6

    • SHA1

      664fdf69f500fd684774707087739412484383a4

    • SHA256

      ca557726088cb7863a06899ffbc19e210d8974bca556a37ba49a6b1feacc1ddc

    • SHA512

      525a2e82f9152664fb02892ab41e09d60a5926edcea56548daf73b0a46e95f8c70994525779d69d0df61774e7de1a098b7aa9605bd4ad3c521277378f7f79189

    • SSDEEP

      12288:3MmEES7ltqOXyVhDF2seW5pQdG4KHRIuI5GW+NExAHReitk64fEETEO:3M7P7luFBn5aITI5h+Nddxlmt

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks