General

  • Target

    4e0453e61609c04bce1071d29f21abc82800e11261e284ca3250fd8655239456.exe

  • Size

    144KB

  • Sample

    241221-c1bbdazpgs

  • MD5

    1d0fb45faa5b7a8b398703596d67c967

  • SHA1

    b326e3801b56b5ed86ae66249e6ea64cdefa1997

  • SHA256

    4e0453e61609c04bce1071d29f21abc82800e11261e284ca3250fd8655239456

  • SHA512

    9fa97e8611fd837f0756a505b8615076187d77fcf8aa5ff802944879e9d4d19ebccaea394b0c4327748c73da6bfca8acba6cdf12c5992056a798f28c064e0a63

  • SSDEEP

    3072:lOBRrLUOPed9xOi756fJnhsRSK2C22/m4ESZo3XRYzXIkQfydzdEpx:A/rLVPW0nsP2Xy+TJfUzW7

Malware Config

Targets

    • Target

      4e0453e61609c04bce1071d29f21abc82800e11261e284ca3250fd8655239456.exe

    • Size

      144KB

    • MD5

      1d0fb45faa5b7a8b398703596d67c967

    • SHA1

      b326e3801b56b5ed86ae66249e6ea64cdefa1997

    • SHA256

      4e0453e61609c04bce1071d29f21abc82800e11261e284ca3250fd8655239456

    • SHA512

      9fa97e8611fd837f0756a505b8615076187d77fcf8aa5ff802944879e9d4d19ebccaea394b0c4327748c73da6bfca8acba6cdf12c5992056a798f28c064e0a63

    • SSDEEP

      3072:lOBRrLUOPed9xOi756fJnhsRSK2C22/m4ESZo3XRYzXIkQfydzdEpx:A/rLVPW0nsP2Xy+TJfUzW7

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks