General

  • Target

    e6f3212045537134b2f5ff7290241af1.bin

  • Size

    2.9MB

  • Sample

    241117-cah9asxpdy

  • MD5

    2bb6bded00e4bab3736d5b5a267d1d3f

  • SHA1

    0e0d9a0fd0ec780c00c835f08cd9555b5f470f4a

  • SHA256

    e636290a2ebf939780fa3fb1ddfbe1296130808a0c0ca6e319b1c7196cf95a27

  • SHA512

    786db3d24afedbde0a43f343e073a872a46ce5225ede82fe7560d3d7a35eeeab4a823817a3ca3007ab4928e6a72c6bed3b9b51f1c832823685e5d31622d60c5c

  • SSDEEP

    49152:MbZqQvYJb4wpVRIx4Su02L+cokSBQJ6zoo39k40Yun9UG9l9kItlDG5Z2JPISLOh:MF0/pkx4H02zJSBk6cov5un9UGX9ksKz

Malware Config

Extracted

Family

vidar

Version

11.7

Botnet

93fc6460673f6002db33ceb23a9e1868

C2

https://t.me/m07mbk

https://steamcommunity.com/profiles/76561199801589826

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Targets

    • Target

      InsstallingFileX64_1.exe

    • Size

      55.2MB

    • MD5

      deae42628027ddba5be9da5d677cab1b

    • SHA1

      258e78c53099ac93d5ccf96bdf4a6cdd7529e3ea

    • SHA256

      0b3ec79d97a2e5edb398768cd1bc525fccca95eea9fbd5fe6ea6acfde3561a7a

    • SHA512

      7b01d4b06f402ed2eef0fb9d16cd32170d16eeb871f48d26cf83e7c3b7803ba8b47d7568a14966c174bfbb1f5224d7ac09d89dfa987230716abc7fa693836cb4

    • SSDEEP

      196608:IVnfEtQ78Kp6OL13ZTsUdXgDzQ7Md4fYATaN5iVWE3lEcmio7PIuGsCdm5kx00Fq:IVnMtQ78xd40Qls7PIxso00

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      rydg86x.dll

    • Size

      41.0MB

    • MD5

      94ede2f21ef711154e0e3221fa794a06

    • SHA1

      7fbd93f1a91ce7d435e3ee43cd535b07560dc9ee

    • SHA256

      dc2ae16c77466c63f0cc61caecbca5983837cee005213b884bccd8a2a9ed587f

    • SHA512

      68c09124512779ef8c7d0c0fa5f445ac137017d7a0fc05db6e32c580b7d92614d0358ea2d8e9dfbc07479b993bb731b56cd6676de33b04cda78de00f8cc3425b

    • SSDEEP

      196608:n3L3NL80mvor/pVpFnD426B+unfh+J/i9AQgS/6XAv8Mh3M1IcjfDGy2lndzVYSi:n3L3NLC26B8/AvP3MelndzVYcZI

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks