General

  • Target

    d1f0a32bc21c51251a719d8b3055ba4102d89dcffdf3b200d635b89dd9b7f551N

  • Size

    598KB

  • Sample

    241012-zeat2szerg

  • MD5

    61ea971f6fc8eb04408b85fc96b54580

  • SHA1

    f561bfab234c00a9245eb26f2536129746a5f076

  • SHA256

    d1f0a32bc21c51251a719d8b3055ba4102d89dcffdf3b200d635b89dd9b7f551

  • SHA512

    e13175be9ddc74e33ec4cffb84f7a532632d433c88d57b02eae3e3aa617baeeed91a547dec39ca3b5059d3d5e598e87e13c29cba54770540abadeb2c0a274271

  • SSDEEP

    12288:gUOvMSDFMq/YQS/wtkVNlA1pRBTBWISlS3n7k20P13Cj8iA64fuETEO:gU4HDFo/otkVNlA1pRhBWIASLZ43CIE6

Malware Config

Extracted

Family

vidar

Botnet

8ecc9c7eaebfdf2a8cc0586d7419d6ea

C2

https://t.me/maslengdsa

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      d1f0a32bc21c51251a719d8b3055ba4102d89dcffdf3b200d635b89dd9b7f551N

    • Size

      598KB

    • MD5

      61ea971f6fc8eb04408b85fc96b54580

    • SHA1

      f561bfab234c00a9245eb26f2536129746a5f076

    • SHA256

      d1f0a32bc21c51251a719d8b3055ba4102d89dcffdf3b200d635b89dd9b7f551

    • SHA512

      e13175be9ddc74e33ec4cffb84f7a532632d433c88d57b02eae3e3aa617baeeed91a547dec39ca3b5059d3d5e598e87e13c29cba54770540abadeb2c0a274271

    • SSDEEP

      12288:gUOvMSDFMq/YQS/wtkVNlA1pRBTBWISlS3n7k20P13Cj8iA64fuETEO:gU4HDFo/otkVNlA1pRhBWIASLZ43CIE6

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks