General

  • Target

    22bded153b8c1ec4b1d1b45e0467f7c6.bin

  • Size

    6KB

  • Sample

    241202-bg171swpem

  • MD5

    5fa17ccd921b51df4e5b3d22ffd588a6

  • SHA1

    3f54527ba9a345b4a249f0591a16221e8596f250

  • SHA256

    e84025b89f099a3391657130136a12bbab866875315b4e54d3c28aee1f636777

  • SHA512

    3406581baa75d3f117e667fa000472dee40b9f3af9ae68cdbed35f44665a56e1b45ec31b04e3f5ddc89b9d489dcadf5ea27a77bd9546050632f4d5203b696af4

  • SSDEEP

    96:awzRxCUuTi5BapYmC+N8I5tijAcD/CrFUB2dBmNeNwzRr55Vyv8qrOzRQV5ZGL+:Jz3BlmrWI58AcD/8dcNeqzRrFFdMrL

Malware Config

Extracted

Family

vidar

Version

11.8

Botnet

41d35cbb974bc2d1287dcd4381b4a2a8

C2

https://t.me/fu4chmo

https://steamcommunity.com/profiles/76561199802540894

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Targets

    • Target

      f07f39ca504a15d670eecad52c272ed5cdc4025fede61cd910d7da2a55d1d052.exe

    • Size

      13KB

    • MD5

      22bded153b8c1ec4b1d1b45e0467f7c6

    • SHA1

      1c8825442a455da9ffa0fd56e0e2848dfa58bf2c

    • SHA256

      f07f39ca504a15d670eecad52c272ed5cdc4025fede61cd910d7da2a55d1d052

    • SHA512

      f6022cbf7120e1771e7ba992bcd59ba5f8f68507d91c10c997a3186766547ea0632347facfdec667c3bde261748eb93ee8df35c71600fd7c459539f629b408bb

    • SSDEEP

      192:0qgaiJUFTQcHVPtAXjJ9vT2O3yP8B50LOZdBcmCEJXVWwTnkVOvQu:57zFEcH769vT2OCkB50LknnVTnkVUQ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks