General

  • Target

    2024-10-28_d3c0d593fe9798856fcc44baa904921c_mafia_rhadamanthys

  • Size

    8.1MB

  • Sample

    241028-q7ybda1blf

  • MD5

    d3c0d593fe9798856fcc44baa904921c

  • SHA1

    aa57ded4e73cf2a8fb61d168a7db00a945fb0da3

  • SHA256

    ae8af3e049e812d26f5001815de7cf20d74c21fcb013b7b1ea7bac95ea0c71d4

  • SHA512

    c020313ac81456b218f4bc34a7fb4ab4fa6e53d2a9bb91dc71467e647f83d553536e564ba58bda9643d6f0061cc503bada12b2f2d61a573a48bbb5343bdd7344

  • SSDEEP

    98304:oUn2udzjz4Y5Bw8QPK8G4kaat37RKkptv5R564UiOtZZSsr:oUDz7w8Qg4et37skp3R01iOXZHr

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

91ee094dd9ffff7505d0f982e8e1ca3f

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Targets

    • Target

      2024-10-28_d3c0d593fe9798856fcc44baa904921c_mafia_rhadamanthys

    • Size

      8.1MB

    • MD5

      d3c0d593fe9798856fcc44baa904921c

    • SHA1

      aa57ded4e73cf2a8fb61d168a7db00a945fb0da3

    • SHA256

      ae8af3e049e812d26f5001815de7cf20d74c21fcb013b7b1ea7bac95ea0c71d4

    • SHA512

      c020313ac81456b218f4bc34a7fb4ab4fa6e53d2a9bb91dc71467e647f83d553536e564ba58bda9643d6f0061cc503bada12b2f2d61a573a48bbb5343bdd7344

    • SSDEEP

      98304:oUn2udzjz4Y5Bw8QPK8G4kaat37RKkptv5R564UiOtZZSsr:oUDz7w8Qg4et37skp3R01iOXZHr

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks