General

  • Target

    a1dc5574153d5053abd2b3818737ec424082491006bc2dcf439b79d168d7b15bN

  • Size

    571KB

  • Sample

    241011-gc1nksxgnd

  • MD5

    7cc4518c0178f801094b2c60fd815050

  • SHA1

    017d7ce204495228eaa13af1a6bac31e62ed7110

  • SHA256

    a1dc5574153d5053abd2b3818737ec424082491006bc2dcf439b79d168d7b15b

  • SHA512

    f3ba9721e5fd8be947dd9203624cfc86193f040f166a86212ca3be87232e8463664bb42294130c45900c9fd116b962dc1b11dcfd76c912196eb207151c20f366

  • SSDEEP

    12288:Lgg1ZnYljsF91r+Nn15g0+tVCvfz06uN7Ds37AedrzivhVfTIQ4S:LznYEpG15g2vfAN7+7AetivhVMh

Malware Config

Extracted

Family

vidar

Botnet

8ecc9c7eaebfdf2a8cc0586d7419d6ea

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      a1dc5574153d5053abd2b3818737ec424082491006bc2dcf439b79d168d7b15bN

    • Size

      571KB

    • MD5

      7cc4518c0178f801094b2c60fd815050

    • SHA1

      017d7ce204495228eaa13af1a6bac31e62ed7110

    • SHA256

      a1dc5574153d5053abd2b3818737ec424082491006bc2dcf439b79d168d7b15b

    • SHA512

      f3ba9721e5fd8be947dd9203624cfc86193f040f166a86212ca3be87232e8463664bb42294130c45900c9fd116b962dc1b11dcfd76c912196eb207151c20f366

    • SSDEEP

      12288:Lgg1ZnYljsF91r+Nn15g0+tVCvfz06uN7Ds37AedrzivhVfTIQ4S:LznYEpG15g2vfAN7+7AetivhVMh

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks