General

  • Target

    b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085.exe

  • Size

    842KB

  • Sample

    241224-gck8wssjdv

  • MD5

    8eb4f92605e35c57a42b0917c221d65c

  • SHA1

    0e64d77ef1b917b3afe512b49710250c71369175

  • SHA256

    b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085

  • SHA512

    4cc5db426c8de3d7afdcfa26440d5bd9a885f5148e4307b8d04c5d56c96672d5c82ed9989bf346ce7aecea07d980735c46a930b885f824ba53738ac76dbb05bf

  • SSDEEP

    24576:qWryjPGki4+5vfHU3fYFy664hRvRKMU+Et:1+FQVUPA/v8MhQ

Malware Config

Targets

    • Target

      b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085.exe

    • Size

      842KB

    • MD5

      8eb4f92605e35c57a42b0917c221d65c

    • SHA1

      0e64d77ef1b917b3afe512b49710250c71369175

    • SHA256

      b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085

    • SHA512

      4cc5db426c8de3d7afdcfa26440d5bd9a885f5148e4307b8d04c5d56c96672d5c82ed9989bf346ce7aecea07d980735c46a930b885f824ba53738ac76dbb05bf

    • SSDEEP

      24576:qWryjPGki4+5vfHU3fYFy664hRvRKMU+Et:1+FQVUPA/v8MhQ

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks