General

  • Target

    9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d

  • Size

    687.1MB

  • Sample

    241221-tj8c8asmbz

  • MD5

    afa3ab248ae8ffea5f1a013de4489f92

  • SHA1

    23f7b778ffce856f6b34911beca40b8a1af5ab0e

  • SHA256

    9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d

  • SHA512

    fe6a0d485e9ee08214d5da06d86d7d70471239cc962856d3db2eba1f731ab885db32bd2bbc1765dd671adb192e71fe69c87f207b5cbd10dda147e5f38e55f71b

  • SSDEEP

    12288:r2NOhN0MUF7G2s7yM8vsbaSo6Ip0UHdu3NA1J:iNy4+yMMsboZp0UHr

Malware Config

Extracted

Family

vidar

Version

1.7

Botnet

713

C2

https://t.me/robloxblackl

https://steamcommunity.com/profiles/76561199458928097

http://135.181.204.67:80

Attributes
  • profile_id

    713

Targets

    • Target

      9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d

    • Size

      687.1MB

    • MD5

      afa3ab248ae8ffea5f1a013de4489f92

    • SHA1

      23f7b778ffce856f6b34911beca40b8a1af5ab0e

    • SHA256

      9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d

    • SHA512

      fe6a0d485e9ee08214d5da06d86d7d70471239cc962856d3db2eba1f731ab885db32bd2bbc1765dd671adb192e71fe69c87f207b5cbd10dda147e5f38e55f71b

    • SSDEEP

      12288:r2NOhN0MUF7G2s7yM8vsbaSo6Ip0UHdu3NA1J:iNy4+yMMsboZp0UHr

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks