General

  • Target

    826fd18e27f434fccdb0f5109720d25152e2e39270bca16c8db2213b2054ac80

  • Size

    617KB

  • Sample

    241130-zgdzgsvkft

  • MD5

    68c605ca212e46310894c1a50e486d6f

  • SHA1

    5390dd73c2bd9c3c2adc9b2b550d5c2ad07cd1bb

  • SHA256

    826fd18e27f434fccdb0f5109720d25152e2e39270bca16c8db2213b2054ac80

  • SHA512

    bf8c0fefebc4617a36c466f947080333b6a32503b54cb009e534db5873cdafc56926b81150c0d06d4e54ad62e1a530afdfb806a5012bfdc3a18c759a94d0c086

  • SSDEEP

    12288:VDOzqXUCABfDDDDDDAObwCTlW8CrPI28o6BN3pIzQhbXs5h/xWaJcGlr7v:VDNXUtBT+PI2UpIzQGbZd7r7v

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

0b3bd69430b7d827b107ba2ed809207d

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      826fd18e27f434fccdb0f5109720d25152e2e39270bca16c8db2213b2054ac80

    • Size

      617KB

    • MD5

      68c605ca212e46310894c1a50e486d6f

    • SHA1

      5390dd73c2bd9c3c2adc9b2b550d5c2ad07cd1bb

    • SHA256

      826fd18e27f434fccdb0f5109720d25152e2e39270bca16c8db2213b2054ac80

    • SHA512

      bf8c0fefebc4617a36c466f947080333b6a32503b54cb009e534db5873cdafc56926b81150c0d06d4e54ad62e1a530afdfb806a5012bfdc3a18c759a94d0c086

    • SSDEEP

      12288:VDOzqXUCABfDDDDDDAObwCTlW8CrPI28o6BN3pIzQhbXs5h/xWaJcGlr7v:VDNXUtBT+PI2UpIzQGbZd7r7v

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks