General

  • Target

    Unlock_Tool_v2.5.9.exe

  • Size

    2.7MB

  • Sample

    241113-sexv9avajn

  • MD5

    e66371441b6223c517e381cfbe8e1864

  • SHA1

    2ac93eca52938e19c086550807923a85800e97a1

  • SHA256

    736ff6e041158ab21fae0f3dc2f2389f2d1baf9186e60d75900c2a71552de95b

  • SHA512

    8aa02d9df0ee8ab6c43c8d7883a9ecfebb1f0957bb61a1101d6331324c28e0496f0c654be548ce34f9f76a08a0c102b3239c6c4b4f0457e708ba980c488d6e3c

  • SSDEEP

    49152:9t0WJo6iw2+BCBhyGDz7cep+/Cz3ddQn0xIpxg2Wv9SJu3YpDg1xUpDg1xQ:AQi2E9KidQn0xIpxg2Wv94pM1CpM16

Malware Config

Extracted

Family

vidar

Version

11.7

Botnet

4b05932e298d86a233eec0514ef2c4f6

C2

https://t.me/m07mbk

https://steamcommunity.com/profiles/76561199801589826

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Targets

    • Target

      Unlock_Tool_v2.5.9.exe

    • Size

      2.7MB

    • MD5

      e66371441b6223c517e381cfbe8e1864

    • SHA1

      2ac93eca52938e19c086550807923a85800e97a1

    • SHA256

      736ff6e041158ab21fae0f3dc2f2389f2d1baf9186e60d75900c2a71552de95b

    • SHA512

      8aa02d9df0ee8ab6c43c8d7883a9ecfebb1f0957bb61a1101d6331324c28e0496f0c654be548ce34f9f76a08a0c102b3239c6c4b4f0457e708ba980c488d6e3c

    • SSDEEP

      49152:9t0WJo6iw2+BCBhyGDz7cep+/Cz3ddQn0xIpxg2Wv9SJu3YpDg1xUpDg1xQ:AQi2E9KidQn0xIpxg2Wv94pM1CpM16

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks