Resubmissions

11-10-2024 14:50

241011-r7wcfsxhkf 10

11-10-2024 14:47

241011-r5zbbssgrp 10

General

  • Target

    default.exe

  • Size

    4.2MB

  • Sample

    241011-r7wcfsxhkf

  • MD5

    589903101622ead17fb90da578086962

  • SHA1

    8c0b3b771ac79959dc155166bf22495b3197b97d

  • SHA256

    e85d5b53626307eb032ccfe4ba7e1441a88af81062e5afe8a69f1d283b4f3ea9

  • SHA512

    49b74af8105878f6d7e491f6bb56d23ad8cb28e317a0c99a1ac36b7aa4948610e3d171a2b64a58fd3fab83ba48691f58bf033462a592fa61bbdd6cb9e49a47fd

  • SSDEEP

    49152:UTgmiz2o3rioSPZQpAookqlq40imXDUZei3xRxwcCjg5835S2m:UcfbiV9U5/3HE58p

Malware Config

Extracted

Family

vidar

Version

10.2

Botnet

6b8642176bdf6e69e18dcef863f92aad

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Targets

    • Target

      default.exe

    • Size

      4.2MB

    • MD5

      589903101622ead17fb90da578086962

    • SHA1

      8c0b3b771ac79959dc155166bf22495b3197b97d

    • SHA256

      e85d5b53626307eb032ccfe4ba7e1441a88af81062e5afe8a69f1d283b4f3ea9

    • SHA512

      49b74af8105878f6d7e491f6bb56d23ad8cb28e317a0c99a1ac36b7aa4948610e3d171a2b64a58fd3fab83ba48691f58bf033462a592fa61bbdd6cb9e49a47fd

    • SSDEEP

      49152:UTgmiz2o3rioSPZQpAookqlq40imXDUZei3xRxwcCjg5835S2m:UcfbiV9U5/3HE58p

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks