General

  • Target

    0e8129471c62d891e5fcd737d6c86f60ea3aa9dad536eaa6899c124fd2913960

  • Size

    291KB

  • Sample

    241223-jh8mgsxmav

  • MD5

    157f9789cf20e699a100419fd42c9372

  • SHA1

    5f6ae38f22239a7df96cac67c486b96aa865e03d

  • SHA256

    0e8129471c62d891e5fcd737d6c86f60ea3aa9dad536eaa6899c124fd2913960

  • SHA512

    fdd6816d42fba3bdf15fe76122923fc67fdfecad9c77b43f7c76c0f85232857074b11550634163b12e6e7d051dcb7c5c668e63b331b33690f75595c5add26a77

  • SSDEEP

    3072:ABjvY9ERHtvTHgT3HrLhq4c55Beu+1NLL/5LSeEviYB+bfDKUEQDE+sdiPslWEZT:CvYORTHoI4+mh/avxYLaQEZXQyS

Malware Config

Targets

    • Target

      0e8129471c62d891e5fcd737d6c86f60ea3aa9dad536eaa6899c124fd2913960

    • Size

      291KB

    • MD5

      157f9789cf20e699a100419fd42c9372

    • SHA1

      5f6ae38f22239a7df96cac67c486b96aa865e03d

    • SHA256

      0e8129471c62d891e5fcd737d6c86f60ea3aa9dad536eaa6899c124fd2913960

    • SHA512

      fdd6816d42fba3bdf15fe76122923fc67fdfecad9c77b43f7c76c0f85232857074b11550634163b12e6e7d051dcb7c5c668e63b331b33690f75595c5add26a77

    • SSDEEP

      3072:ABjvY9ERHtvTHgT3HrLhq4c55Beu+1NLL/5LSeEviYB+bfDKUEQDE+sdiPslWEZT:CvYORTHoI4+mh/avxYLaQEZXQyS

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks