General
-
Target
ts.js
-
Size
4KB
-
Sample
241028-v2ez3avbpq
-
MD5
ed3b56e4275b4a0ed7b7b0b7bd7461c6
-
SHA1
404efc9a3c6be253546f9ad0cc6b61df5efbf091
-
SHA256
848296488fd185d3621c274420d9e59b974734234ec4e420bc11820f26c732a6
-
SHA512
7bc3684177b1ec80b3e7895522f29996a706a3215314307726c9ecaab65b5525936725bf41d876fdd575e9dd583d6cc1e02ca9fed2988418d4cf33fb8d3f208a
-
SSDEEP
96:dCkwnKuF0idLODzNXkv6YxiMjip1PDpmMjDqVoV7bKD8Ngr:fwndTdCDz1SLxixp1PPjD9btNgr
Static task
static1
Malware Config
Extracted
vidar
8
Extracted
vidar
https://t.me/fun88rockskek
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
ts.js
-
Size
4KB
-
MD5
ed3b56e4275b4a0ed7b7b0b7bd7461c6
-
SHA1
404efc9a3c6be253546f9ad0cc6b61df5efbf091
-
SHA256
848296488fd185d3621c274420d9e59b974734234ec4e420bc11820f26c732a6
-
SHA512
7bc3684177b1ec80b3e7895522f29996a706a3215314307726c9ecaab65b5525936725bf41d876fdd575e9dd583d6cc1e02ca9fed2988418d4cf33fb8d3f208a
-
SSDEEP
96:dCkwnKuF0idLODzNXkv6YxiMjip1PDpmMjDqVoV7bKD8Ngr:fwndTdCDz1SLxixp1PPjD9btNgr
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1