General

  • Target

    f2c2df5d625c6983881695ab53416c52aa574821e01074f607b6039e5d79e76f_Sigmanly

  • Size

    144KB

  • Sample

    241224-vdgtraskcw

  • MD5

    2e45d5934db7da8ff7b560a80ceb96ab

  • SHA1

    e1d653b1a6acbacd6eb592041d21786ca3a633c8

  • SHA256

    f2c2df5d625c6983881695ab53416c52aa574821e01074f607b6039e5d79e76f

  • SHA512

    7caedba355fbf00ff68e17345ca7fdf79e2dba70c7284dc3bb7bfe4afc478f1f4ca4969ccf3080a391c138abf6f0d14b30e2832e3eaf4a3072519c08621c635a

  • SSDEEP

    3072:lOBRrLUOPed9xOi756fJnhsRSK2C22/m4ESZo3XRYzXIkQfyIzdEpx:A/rLVPW0nsP2Xy+TJfVzW7

Malware Config

Targets

    • Target

      f2c2df5d625c6983881695ab53416c52aa574821e01074f607b6039e5d79e76f_Sigmanly

    • Size

      144KB

    • MD5

      2e45d5934db7da8ff7b560a80ceb96ab

    • SHA1

      e1d653b1a6acbacd6eb592041d21786ca3a633c8

    • SHA256

      f2c2df5d625c6983881695ab53416c52aa574821e01074f607b6039e5d79e76f

    • SHA512

      7caedba355fbf00ff68e17345ca7fdf79e2dba70c7284dc3bb7bfe4afc478f1f4ca4969ccf3080a391c138abf6f0d14b30e2832e3eaf4a3072519c08621c635a

    • SSDEEP

      3072:lOBRrLUOPed9xOi756fJnhsRSK2C22/m4ESZo3XRYzXIkQfyIzdEpx:A/rLVPW0nsP2Xy+TJfVzW7

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks