General

  • Target

    06342512b7bcdfdda8d6ea8e2d5a24e4.bin

  • Size

    1.0MB

  • Sample

    241225-bcs1vaspfl

  • MD5

    09740a1352d2bb0629255577fa8b9fd3

  • SHA1

    28f3dde431fb87cdbf21502795a53d8b9cf5ea40

  • SHA256

    f8e61c5f3f84057fcffba681628fa74abf3bca3c94f998f415330137a3bfbf5c

  • SHA512

    07dc4a59e682a787700feae4f67d34a4c3e418b8472c28a92578964cd2a0a102110f5afc07f169b9678556e7fcd2f2d848e67a014b2764c65dbbb2e03cc4b7e7

  • SSDEEP

    24576:3n6eknegaZlbxOe7szplseG0ovOPNmweSMTqK9r2QgOCCd6:3YnegaZFYjpiOAweU8rl36

Malware Config

Targets

    • Target

      89b55665c76315777e1f2a9a5be784fd2590b917388f657c6f5c2caa055e87c2.exe

    • Size

      1.1MB

    • MD5

      06342512b7bcdfdda8d6ea8e2d5a24e4

    • SHA1

      5a656ac27d5a03ee63f08dd499bacd01e0a12c3f

    • SHA256

      89b55665c76315777e1f2a9a5be784fd2590b917388f657c6f5c2caa055e87c2

    • SHA512

      5824c39a30b7acacd949812bafcf99afcdc95361b2196567aae4e1f2445803c37971a572537c132a01b930e204745ccf7f082386147ea3b611c745eef2ea3eb4

    • SSDEEP

      24576:StmrKn0UVWKbcO1wZ8Baw0QD4Iv2kSen/rhSjJVC6h2Lg2np2uGVemv+Gl9o:8O6rIO1k8L0QcIv7nThSjeuKzDAemu

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks