General

  • Target

    f5ad3ca6464635488824c3e5b6284ca263e7c6417ec854692d839a1c008d5e23.exe

  • Size

    878KB

  • Sample

    241220-khlcmatpez

  • MD5

    c5f715f9eefa5e42fd10fc3b6e90953b

  • SHA1

    92ae82a3ce9799e2af542597f9edb94c4ef1d6c5

  • SHA256

    f5ad3ca6464635488824c3e5b6284ca263e7c6417ec854692d839a1c008d5e23

  • SHA512

    1335f65b2019421b8fb1a706dba5dd33e3b2c43685d9b6f2bb8656c4097e1f7281358ad4d0ef87620fe2efa9ea5c00af10cba22e9c7a3c6f0049292518207175

  • SSDEEP

    24576:S3BBt7zXHyaroKgT3yniH3Vn/WsNGJ2S5mFZIb8jJ61IHic:Eo9CniHl+sNu54gUKK

Malware Config

Targets

    • Target

      f5ad3ca6464635488824c3e5b6284ca263e7c6417ec854692d839a1c008d5e23.exe

    • Size

      878KB

    • MD5

      c5f715f9eefa5e42fd10fc3b6e90953b

    • SHA1

      92ae82a3ce9799e2af542597f9edb94c4ef1d6c5

    • SHA256

      f5ad3ca6464635488824c3e5b6284ca263e7c6417ec854692d839a1c008d5e23

    • SHA512

      1335f65b2019421b8fb1a706dba5dd33e3b2c43685d9b6f2bb8656c4097e1f7281358ad4d0ef87620fe2efa9ea5c00af10cba22e9c7a3c6f0049292518207175

    • SSDEEP

      24576:S3BBt7zXHyaroKgT3yniH3Vn/WsNGJ2S5mFZIb8jJ61IHic:Eo9CniHl+sNu54gUKK

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks