General

  • Target

    Unlock_Tool.zip

  • Size

    53.6MB

  • Sample

    241029-dtg11s1qgx

  • MD5

    60ea19e5e426a3c65fd7e1d9b8b93b78

  • SHA1

    997fa5eb16cc05653d767218faf217587030c644

  • SHA256

    bc1e335f23c95ab3e41f7b94c9b3b4c140a09361c508587d38d720a54141faf8

  • SHA512

    b75ef329af812937a952a0e78f745a50f9507758dfc5b792969b47e7d9256144f79d12fbab6c3c249b76713c87554940489d0641e4aa2b861072c4b08d06520d

  • SSDEEP

    1572864:GMlvVJdOWRPdH2N0injqfW6Z8MkK1kP4qq7nGcuzB:flNJdJHc7n+f98MP1NJ4B

Malware Config

Extracted

Family

vidar

C2

https://t.me/asg7rd

https://steamcommunity.com/profiles/76561199794498376

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Targets

    • Target

      Unlock_Tool_2.4.1.rar

    • Size

      53.6MB

    • MD5

      2b6f6b54f320a7322f04426a99085966

    • SHA1

      b014af8aaa98fa422265de9fa4522cbdef12641f

    • SHA256

      28bf5e3b9fb5485c3e98fcf3a98ed61884bbf9419fddad53855ce08284d6b97c

    • SHA512

      4645fa85b041e77a1318e7b4aea73281f85586ca3280a3bb77cca47999f0c786ee178a406c1f74d5e12562a3548ce442ff345ea73204e9c010474ff610dd784e

    • SSDEEP

      1572864:aMlvVJdOWRPdH2N0injqfW6Z8MkK1kP4qq7nGcuz6:rlNJdJHc7n+f98MP1NJ46

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks