General

  • Target

    gg.txt

  • Size

    1KB

  • Sample

    241219-ththnsvmhy

  • MD5

    4c1d5a75dc7dbff21097fb5a63bedfec

  • SHA1

    d3a9435b41227be9617e472adbcc60c93a970c1a

  • SHA256

    13848f74c576b1624b6b64dd556791a7b40b7fee6a0fa7ea6ce3f82c8cc98b2b

  • SHA512

    74770ffea4ef1b427a8dd06b61f2f11990cce7034ee29fcb29d5470c5628338aec6454503e7592b4c75e5fdac3f21f5e5a1f12c6b57c972cafa70bc558705968

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://polovoiinspektor.shop/PolymerReload.exe

Targets

    • Target

      gg.txt

    • Size

      1KB

    • MD5

      4c1d5a75dc7dbff21097fb5a63bedfec

    • SHA1

      d3a9435b41227be9617e472adbcc60c93a970c1a

    • SHA256

      13848f74c576b1624b6b64dd556791a7b40b7fee6a0fa7ea6ce3f82c8cc98b2b

    • SHA512

      74770ffea4ef1b427a8dd06b61f2f11990cce7034ee29fcb29d5470c5628338aec6454503e7592b4c75e5fdac3f21f5e5a1f12c6b57c972cafa70bc558705968

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks