General

  • Target

    13cf27504612ba911a324205db08dfa22cc42f3cb7e2600a69b65091ac528940

  • Size

    617KB

  • Sample

    241201-ws12lssmgk

  • MD5

    0d90ef55d1b1cb43ccb8fd30bbeba1a4

  • SHA1

    5230fea74e8c4dedda59cbcdd13a9bc7ad035ac0

  • SHA256

    13cf27504612ba911a324205db08dfa22cc42f3cb7e2600a69b65091ac528940

  • SHA512

    9ced2030fee2ffa87246949d64d01493d4afd90082d7a6a376e2ffb454cd4553c30deff65b5dcf84e803f6019b5efd711e0dfd6738de12da037b009209ad854d

  • SSDEEP

    12288:NFgKK6/E6QB44hLSVGuZwpZhOre3fpkugJtCJcplr7v:NFgS/EVe4hL0GuZwpZ6e3CXmGr7v

Malware Config

Extracted

Family

vidar

Version

11.1

Botnet

0b3bd69430b7d827b107ba2ed809207d

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Targets

    • Target

      13cf27504612ba911a324205db08dfa22cc42f3cb7e2600a69b65091ac528940

    • Size

      617KB

    • MD5

      0d90ef55d1b1cb43ccb8fd30bbeba1a4

    • SHA1

      5230fea74e8c4dedda59cbcdd13a9bc7ad035ac0

    • SHA256

      13cf27504612ba911a324205db08dfa22cc42f3cb7e2600a69b65091ac528940

    • SHA512

      9ced2030fee2ffa87246949d64d01493d4afd90082d7a6a376e2ffb454cd4553c30deff65b5dcf84e803f6019b5efd711e0dfd6738de12da037b009209ad854d

    • SSDEEP

      12288:NFgKK6/E6QB44hLSVGuZwpZhOre3fpkugJtCJcplr7v:NFgS/EVe4hL0GuZwpZ6e3CXmGr7v

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks