General

  • Target

    Main_11.1_07-10-2024 (1).zip

  • Size

    201KB

  • Sample

    241021-p9r2psvbmh

  • MD5

    7671aba560a85d81e55ee9ecd5430a19

  • SHA1

    fca282ac8b801980de0f1db83e38c8fac08e424a

  • SHA256

    de3e70d4f069cc695d6b0ebde4ecaa6b950dcc3977fd0e063b0224f19fd4bcf7

  • SHA512

    472f15e510b5445e9e61e1d4a1f34c666a29a7c275a086009c5d807c106bb04edb3b30d123fb42c17a7030956042e58fbf366a86e8224236cc8508e622a62d25

  • SSDEEP

    6144:7qd1/Tpp8HBGP9HQv/RDRgTv6VY8tkdkvdDMT7lV+:7qd1/Tpp8HB89HQvrgTC8atMfC

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

f8b7ed640e3d534d5cc6a100795dcc3a

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      build.exe

    • Size

      383KB

    • MD5

      2c27476ecbf91fe3cbdb30adbb75ccb9

    • SHA1

      0aaae4e0afa724b73b9607b657df2f1c91468e9d

    • SHA256

      15519c084c4b506d431c1bb22d95e120ea4b54ec8d702029add1ca091904852d

    • SHA512

      5af72a5117f18a9bafa91a2f7438330b2c8768533b89c9d76f5bdee81a3125ec3b21fbff8aa19a2c74db526d76e8ffb759b3590270c58ba2137c28084e01ebff

    • SSDEEP

      6144:NGO+83+N11n5au8LvOWjTMZG6wn+d8ekx0wKYHMCsHW+S0ZaaPG:NGOv3+N11n5ALvpjTACn+Wek0VYExdZa

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks