General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.74258817.17122.7170.exe

  • Size

    9.1MB

  • Sample

    241013-wdmknszapg

  • MD5

    de40920ceb6061d4a5b62fd03a9438c5

  • SHA1

    eb3d3f46aad57e868b9d4b2c07d24410bfd2ca85

  • SHA256

    959e47ec654acce16b8df4466da97f8479d65b9a69a2c3603c3cb6856ceaecc0

  • SHA512

    fa0ea73440e794092045fdada16fb702ae7e5962a09d2fa62d7873a1c211c9b55037cb34c15477cdaf6052a0d7443ce413cebe35e4785032718666246af712f6

  • SSDEEP

    49152:kT2J6mHyA+c9OoSgI/QDBmdnR1ell3R4NqU8nq9LBWJYu5blvGRCnQoxYLaHFsjh:nI2yA+c9OUrDyymevvWSoxGd8IM7N

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

467d1313a0fbcd97b65a6f1d261c288f

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.74258817.17122.7170.exe

    • Size

      9.1MB

    • MD5

      de40920ceb6061d4a5b62fd03a9438c5

    • SHA1

      eb3d3f46aad57e868b9d4b2c07d24410bfd2ca85

    • SHA256

      959e47ec654acce16b8df4466da97f8479d65b9a69a2c3603c3cb6856ceaecc0

    • SHA512

      fa0ea73440e794092045fdada16fb702ae7e5962a09d2fa62d7873a1c211c9b55037cb34c15477cdaf6052a0d7443ce413cebe35e4785032718666246af712f6

    • SSDEEP

      49152:kT2J6mHyA+c9OoSgI/QDBmdnR1ell3R4NqU8nq9LBWJYu5blvGRCnQoxYLaHFsjh:nI2yA+c9OUrDyymevvWSoxGd8IM7N

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.