General

  • Target

    out_sig.exe

  • Size

    5.0MB

  • Sample

    241121-xaz72avld1

  • MD5

    98169d8760c2fcb356c9583b09d44587

  • SHA1

    0e5bcc84c99fc14c6fbf26e8ce195d6170dc0ad6

  • SHA256

    55f3a969a56a2abde560a4d6997575a957527a8f4c1993bc2607162282e5265f

  • SHA512

    4b37db47c6cf02afeeb394edf2580a03e790ca985b776d01591de2b202a7ea8ffd7a59c2679034fe9c90521aab91c4af2a3576f63517f6469f0178f767aa0308

  • SSDEEP

    49152:C3TR+XFHckM8wwGbtBiRFWSGqCW4FL5wslsAEL1ksS2NHsF3TjZ1105jgv1fRbcy:CIHwrb64XwWsAwFaFXu+3

Malware Config

Extracted

Family

vidar

Version

10.7

Botnet

e4c95706ca9ca1f557526e6bb6442743

C2

https://steamcommunity.com/profiles/76561199751190313

https://t.me/pech0nk

Targets

    • Target

      out_sig.exe

    • Size

      5.0MB

    • MD5

      98169d8760c2fcb356c9583b09d44587

    • SHA1

      0e5bcc84c99fc14c6fbf26e8ce195d6170dc0ad6

    • SHA256

      55f3a969a56a2abde560a4d6997575a957527a8f4c1993bc2607162282e5265f

    • SHA512

      4b37db47c6cf02afeeb394edf2580a03e790ca985b776d01591de2b202a7ea8ffd7a59c2679034fe9c90521aab91c4af2a3576f63517f6469f0178f767aa0308

    • SSDEEP

      49152:C3TR+XFHckM8wwGbtBiRFWSGqCW4FL5wslsAEL1ksS2NHsF3TjZ1105jgv1fRbcy:CIHwrb64XwWsAwFaFXu+3

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks