General

  • Target

    13eb2bb3303156d695ecf3f2b2c09eb7.bin

  • Size

    32KB

  • Sample

    241202-bgm1ds1nes

  • MD5

    65302f026c4e710262f095e20595c27e

  • SHA1

    5b196127d532113123d2de153f7b237fc75b359f

  • SHA256

    2717732bd1b18153a65172c661ee28e5926c2b24c1e556cca701c9f3b6973bdb

  • SHA512

    f9effdf775298e34f4ce94f8aec193e5dc04020f8d6a11f5c6b323cc3eb2de95503df5982f956bb0ff823b8ea145770894f5a5d1af5f7ba02092821ce009b13f

  • SSDEEP

    768:KV8fPeKbCNzpSvTyb88hZS/2DAvBpps/Bt/Crq7JKQMdT:KV8fVUz0uw8C/2DoBpps/Bt8q7JKQQ

Malware Config

Extracted

Family

vidar

Version

11.8

Botnet

41d35cbb974bc2d1287dcd4381b4a2a8

C2

https://t.me/fu4chmo

https://steamcommunity.com/profiles/76561199802540894

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Targets

    • Target

      8680e9ff0246c2b7cd4a45a9c6262851ce8d12e4638e48cb1baec267c2b6ea6b.exe

    • Size

      26.0MB

    • MD5

      13eb2bb3303156d695ecf3f2b2c09eb7

    • SHA1

      db1f2877681d02201c6c9d71d8c52a872c3612b9

    • SHA256

      8680e9ff0246c2b7cd4a45a9c6262851ce8d12e4638e48cb1baec267c2b6ea6b

    • SHA512

      6f44a7f1612f0eb4843c1e0de757a03f53d2b14e7aa8b7f983c2ca9baf0701d30f129edeab9c889655840782a1289fb4d0bf0699223e3c584afdaa4ee5172172

    • SSDEEP

      192:0qgaiJUFTQcHVPtAXjJ9vT2O3yP8B50LOZdBcmCEJXVWwTnkVOvQu:57zFEcH769vT2OCkB50LknnVTnkVUQ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks