General

  • Target

    c27332944c3fcd30f2f9602851aaac35062ff4f098d455027374a4ba558cd908N

  • Size

    598KB

  • Sample

    241011-nz1ena1anh

  • MD5

    a5b15ec149a36acdc1bca8a69dce8d10

  • SHA1

    fa03fda33b5243667ac1acfc678ebce1e3017f4a

  • SHA256

    c27332944c3fcd30f2f9602851aaac35062ff4f098d455027374a4ba558cd908

  • SHA512

    f200ec8f913a3b566355591388914f3b7c19070d87eb3c02f5246ea1c2b323e32dc4f81aa40edd431b7a08148a18e08f6bab3554b9f946b5e5e714c78fdd3fa9

  • SSDEEP

    12288:bMiEES7ltqbtWmTzuD5cs9K2+dvC5gd5/HHMGl3KXo64fSETEO:bM/P7l4q1l9K2JePHg/Pmt

Malware Config

Extracted

Family

vidar

Botnet

5d5c21db908d8fe19952873f9f748174

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      c27332944c3fcd30f2f9602851aaac35062ff4f098d455027374a4ba558cd908N

    • Size

      598KB

    • MD5

      a5b15ec149a36acdc1bca8a69dce8d10

    • SHA1

      fa03fda33b5243667ac1acfc678ebce1e3017f4a

    • SHA256

      c27332944c3fcd30f2f9602851aaac35062ff4f098d455027374a4ba558cd908

    • SHA512

      f200ec8f913a3b566355591388914f3b7c19070d87eb3c02f5246ea1c2b323e32dc4f81aa40edd431b7a08148a18e08f6bab3554b9f946b5e5e714c78fdd3fa9

    • SSDEEP

      12288:bMiEES7ltqbtWmTzuD5cs9K2+dvC5gd5/HHMGl3KXo64fSETEO:bM/P7l4q1l9K2JePHg/Pmt

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks