General

  • Target

    17f43303c82bf997758d11a246902669.bin

  • Size

    449KB

  • Sample

    241021-bgph8asejp

  • MD5

    184a7cb7408a2fbe6a8dff05858cc3e1

  • SHA1

    02b2efa7f83b1679561e1aed0325b68d327ba664

  • SHA256

    d18fa0e68c2ca1a424b1108304feb45c4fe5c84dbb2f422bb9500c4bb9eb5dfa

  • SHA512

    be9c48219d4a4e0cbce67fdfb01e520bff264010364cf9e87257e8f5d565dd8d5984f7267c0c18539e5a43059788497ef0e601eed10b289489e565170943071d

  • SSDEEP

    12288:1NjcxSwBhXkCJpUmEz+AFLHHvMOA7aKC8xTmgJ6y:DgxSwBhfUm2rUOV8x3J6y

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

0b3bd69430b7d827b107ba2ed809207d

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      910d5163c8b1b2b7c6c4a22195455143c8e2aac49f9b089d4fff6cfbbd781e78.exe

    • Size

      496KB

    • MD5

      17f43303c82bf997758d11a246902669

    • SHA1

      7d4863c31780e3927b9993e6924297b6a281fe91

    • SHA256

      910d5163c8b1b2b7c6c4a22195455143c8e2aac49f9b089d4fff6cfbbd781e78

    • SHA512

      5fac221226f0cd76cc63ff942b458d50d12fe08bc432c4a1a7593c04ddd7676b54ea812593aa9b8fd8a1adbcec81f413752c7896f4be75a30bf323d303359d75

    • SSDEEP

      12288:1myaTL4aY7+6iU9WGh691zRhbPdUQmeK3LbXCoL:1gTLSq6iEW66DrSQmv3LDC6

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks