General

  • Target

    765eb00651ebf6ddbc9c8d6e687292dae89f0d8260cea08505020992835208d8.exe

  • Size

    383KB

  • Sample

    241021-bs5dta1gjh

  • MD5

    1e1d5412616216fd90ea3cb6a87353db

  • SHA1

    da0ae99aebbde6433c8dc985e8c8b2305cdb9b54

  • SHA256

    765eb00651ebf6ddbc9c8d6e687292dae89f0d8260cea08505020992835208d8

  • SHA512

    fcffb031004aa683656cd2d8ada0703255dd6fd01bf7e2b811e919ee33d4dff9b80ca6f17f44436c2a10d6bafa0abc4fb6c5f3151f167524293302841b00fbe3

  • SSDEEP

    6144:MGO+83+N11n5au8LvOWjTMZG6wn+O8qkx0wKYHMCsHW+S0ZaaPG:MGOv3+N11n5ALvpjTACn+dqk0VYExdZa

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

df523263f44cc8d55414a260a0197e4a

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      765eb00651ebf6ddbc9c8d6e687292dae89f0d8260cea08505020992835208d8.exe

    • Size

      383KB

    • MD5

      1e1d5412616216fd90ea3cb6a87353db

    • SHA1

      da0ae99aebbde6433c8dc985e8c8b2305cdb9b54

    • SHA256

      765eb00651ebf6ddbc9c8d6e687292dae89f0d8260cea08505020992835208d8

    • SHA512

      fcffb031004aa683656cd2d8ada0703255dd6fd01bf7e2b811e919ee33d4dff9b80ca6f17f44436c2a10d6bafa0abc4fb6c5f3151f167524293302841b00fbe3

    • SSDEEP

      6144:MGO+83+N11n5au8LvOWjTMZG6wn+O8qkx0wKYHMCsHW+S0ZaaPG:MGOv3+N11n5ALvpjTACn+dqk0VYExdZa

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks