General

  • Target

    20bef33e4a0add922ae043e2aed13ea2.bin

  • Size

    1.2MB

  • Sample

    241226-bgvp8ssrcy

  • MD5

    ea76954322a7e3c36304042da4bfdd2f

  • SHA1

    cb1014591510d2842c31ee90d23dedde3a243f4f

  • SHA256

    eee455fdae60a3f7d405385b00ca6d9c6709a5df678a59e9e4320b60b59963f1

  • SHA512

    6db0d1effa345020b2fbc3e23b77ec9513cdaf9a6b6a7ae9bb8a9f66ecf8c11c476e53dd73fc602bda11d5a9c00081cad2b7244a186c5ed0d872c0002c978c05

  • SSDEEP

    24576:GPCKli9v/8h1hl9MWBMbPqRhVnJqWsEK2Bv1Y:GPCKleH8LPeqJrsEfBvC

Malware Config

Targets

    • Target

      847c28adfa050608203f206d31cce27f1f27e89ab138908473c8c69ccf388ca2.exe

    • Size

      1.2MB

    • MD5

      20bef33e4a0add922ae043e2aed13ea2

    • SHA1

      4d0353be8234f56862b7ea7ece4ded3eeef91cbb

    • SHA256

      847c28adfa050608203f206d31cce27f1f27e89ab138908473c8c69ccf388ca2

    • SHA512

      7a387b96497c0026d01820e586e4d0a9686b9927c3270a18170a1e5c138dc8bbee759bed63058fdc865a613956ca7258f7058a6fff78a156f85d6d9a8421c469

    • SSDEEP

      24576:Fx9yUoL9cVIpol/OQy1HvVrQaygJy/LilXabJUbsVF1M2/y:X9loLhpWIHtUvgyz4KbJYsVzy

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks