General

  • Target

    TradingView Premium Desktop.exe

  • Size

    780.2MB

  • Sample

    241019-mky3lstcnm

  • MD5

    670113fe6bf7fbcd6006f0d04d3daa72

  • SHA1

    9ca0920c3e73e08c7c585398bdb0756f0fa0f5ae

  • SHA256

    437351bc383d4274bc279d699eabdad546d6d68760bf04372a0c0430ad0ca41b

  • SHA512

    e5a2b925dde644a2d69c6b4dd763f2ca1be778d754431a4b27fe093f230234f18f3ef8b92060e9b290f31e4d59ea33215c803064b6a1db33195f654516cfffd9

  • SSDEEP

    196608:Raed/aHefyyj4OfTL7SSGnh/Q7cq2hKSIv3/5DLz:Raw/akxH7O/CoKPx

Malware Config

Targets

    • Target

      TradingView Premium Desktop.exe

    • Size

      780.2MB

    • MD5

      670113fe6bf7fbcd6006f0d04d3daa72

    • SHA1

      9ca0920c3e73e08c7c585398bdb0756f0fa0f5ae

    • SHA256

      437351bc383d4274bc279d699eabdad546d6d68760bf04372a0c0430ad0ca41b

    • SHA512

      e5a2b925dde644a2d69c6b4dd763f2ca1be778d754431a4b27fe093f230234f18f3ef8b92060e9b290f31e4d59ea33215c803064b6a1db33195f654516cfffd9

    • SSDEEP

      196608:Raed/aHefyyj4OfTL7SSGnh/Q7cq2hKSIv3/5DLz:Raw/akxH7O/CoKPx

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks