General

  • Target

    set-up.rar

  • Size

    5.7MB

  • Sample

    241011-ymrxvs1apa

  • MD5

    fa9d8831acd6b8d57a84cc0e7f5b4fca

  • SHA1

    103660232c33dc6473461b4dfeb3d2eb88e2e428

  • SHA256

    b3b54d959998990b64af8b55ebcbdcb93618f8d09f910b2d257aa4f87f2496d2

  • SHA512

    57fde6c4fdefcc501f8588c0b6b1973e4d5c15f3565dbff97607ac737dada80c080f2c61f4b8e56435e45a0c994504b05e94b7cc03fb9dc1c762876ded5c5daa

  • SSDEEP

    98304:fntv0oZEMN9C0sC1jbg6wfVP3gqEDWMvwnrlZ7XcFGt3YBru9k7zXog8loqz+t6K:ftvGMN98C1MJxwFW3nZZ7XMGyiC7zYMF

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

bed60e7985fadd893545d14f20bd7015

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      Set-up.exe

    • Size

      5.8MB

    • MD5

      89eeadb0cd832d6612b7889ddedca422

    • SHA1

      06139f8ca43002a93229734eae6edab1cb25599f

    • SHA256

      24990992d5bfd060f9ae55e57076f9a20fc968071c8b74f183572c7bc1cc2fa0

    • SHA512

      2ac67b66e087df0988c79e1a047f99727f82a3141dccfeb58ef95c60e5ede49d93b0f0d55d513a768460c877a19ee5cbc27d121dac06f3e452cf42ecc830a193

    • SSDEEP

      98304:0Ihhvd0ZSAsCEVf9kVQZW0AKwHFoXne5Xfhn91PGjXIMPmpnbK1eh:0Ihhv2GpZWDKCouFJPurI5BG1e

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks