General

  • Target

    Setup_Installer_1.3.6_x64.exe

  • Size

    49.3MB

  • Sample

    241112-v59c3sxfnl

  • MD5

    29fa71fab96724091fdf7a66dca09c67

  • SHA1

    15fcb631fa6cc825639cd4e15d37d844faac6fdd

  • SHA256

    882759dd0f306ab06f597c2db3011e82eff5bb7515de5d28a20b6913fe7f5626

  • SHA512

    12acf8548f03d230b28d7b5c1eb9009e2ebd7abb06f781c38c15f0d04bae32aded9e692ade4541c2b89e27398de4da853a2a00e94637fea67db4174f710d8a04

  • SSDEEP

    1572864:NwfwuNI9XY9hQtPkGKTD85uMWW7z0PbYF:NCu9oAdETgu3f8F

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gatugo.com/paz/pan4.zip

exe.dropper

http://gatugo.com/paz/pan1.zip

exe.dropper

http://gatugo.com/paz/pan3.zip

exe.dropper

http://gatugo.com/paz/pan2.zip

exe.dropper

http://gatugo.com/pan/

Extracted

Family

vidar

Version

11.7

Botnet

721d3f29688b3d8f568f99a7d2115582

C2

https://5.75.214.111

https://t.me/m07mbk

https://steamcommunity.com/profiles/76561199801589826

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Targets

    • Target

      Setup_Installer_1.3.6_x64.exe

    • Size

      49.3MB

    • MD5

      29fa71fab96724091fdf7a66dca09c67

    • SHA1

      15fcb631fa6cc825639cd4e15d37d844faac6fdd

    • SHA256

      882759dd0f306ab06f597c2db3011e82eff5bb7515de5d28a20b6913fe7f5626

    • SHA512

      12acf8548f03d230b28d7b5c1eb9009e2ebd7abb06f781c38c15f0d04bae32aded9e692ade4541c2b89e27398de4da853a2a00e94637fea67db4174f710d8a04

    • SSDEEP

      1572864:NwfwuNI9XY9hQtPkGKTD85uMWW7z0PbYF:NCu9oAdETgu3f8F

    • Detect Vidar Stealer

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Netsupport family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks