General

  • Target

    Set-up.exe.v

  • Size

    5.8MB

  • Sample

    241011-rhyfhs1fnq

  • MD5

    89eeadb0cd832d6612b7889ddedca422

  • SHA1

    06139f8ca43002a93229734eae6edab1cb25599f

  • SHA256

    24990992d5bfd060f9ae55e57076f9a20fc968071c8b74f183572c7bc1cc2fa0

  • SHA512

    2ac67b66e087df0988c79e1a047f99727f82a3141dccfeb58ef95c60e5ede49d93b0f0d55d513a768460c877a19ee5cbc27d121dac06f3e452cf42ecc830a193

  • SSDEEP

    98304:0Ihhvd0ZSAsCEVf9kVQZW0AKwHFoXne5Xfhn91PGjXIMPmpnbK1eh:0Ihhv2GpZWDKCouFJPurI5BG1e

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

bed60e7985fadd893545d14f20bd7015

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      Set-up.exe.v

    • Size

      5.8MB

    • MD5

      89eeadb0cd832d6612b7889ddedca422

    • SHA1

      06139f8ca43002a93229734eae6edab1cb25599f

    • SHA256

      24990992d5bfd060f9ae55e57076f9a20fc968071c8b74f183572c7bc1cc2fa0

    • SHA512

      2ac67b66e087df0988c79e1a047f99727f82a3141dccfeb58ef95c60e5ede49d93b0f0d55d513a768460c877a19ee5cbc27d121dac06f3e452cf42ecc830a193

    • SSDEEP

      98304:0Ihhvd0ZSAsCEVf9kVQZW0AKwHFoXne5Xfhn91PGjXIMPmpnbK1eh:0Ihhv2GpZWDKCouFJPurI5BG1e

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks