General

  • Target

    54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156

  • Size

    275KB

  • Sample

    241128-ws7t6avrcs

  • MD5

    0abcf5f274cf19c6f9c75954e9b6a182

  • SHA1

    e39e1cecaffce08ffd9388ded9e13132e1eb6d51

  • SHA256

    54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156

  • SHA512

    c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd

  • SSDEEP

    6144:dh0ZpFC4sffny7TuLBdZlT4DIJYdy3F8ioyrN:dh0ZpFCfB3TGyYy3uiBZ

Malware Config

Extracted

Family

vidar

Version

11.8

Botnet

fc02efe1cfb2a62f36f33fff0274fb41

C2

https://t.me/fu4chmo

https://steamcommunity.com/profiles/76561199802540894

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Targets

    • Target

      54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156

    • Size

      275KB

    • MD5

      0abcf5f274cf19c6f9c75954e9b6a182

    • SHA1

      e39e1cecaffce08ffd9388ded9e13132e1eb6d51

    • SHA256

      54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156

    • SHA512

      c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd

    • SSDEEP

      6144:dh0ZpFC4sffny7TuLBdZlT4DIJYdy3F8ioyrN:dh0ZpFCfB3TGyYy3uiBZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks