General

  • Target

    d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7N.exe

  • Size

    728KB

  • Sample

    250102-edndja1qd1

  • MD5

    096d916600270da3e1c1d78d0288af70

  • SHA1

    f99cd749e84d0452dbe9d9fa8ea23280a6797214

  • SHA256

    d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7

  • SHA512

    73b83bffcd3b3c18398ab88d1dcb89523672fbea55b6fe2105a6c28ba428c10a2cf5251b50e0c982552867bff11eb42c96be91875c5d853e6b0474173d15c7af

  • SSDEEP

    12288:WER9K8FUeR5Z9tRvSCJ6UJUdQ3MGKTOxT8LkMAr156KuGVW9HUPXNJ5AQAh5ShNG:WELNFUeLzvFAUOdQDKTbkMATpWxU1oiI

Malware Config

Extracted

Family

vidar

Version

10.4

Botnet

237

C2

http://direstolakolai.top/

Attributes
  • profile_id

    237

Targets

    • Target

      d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7N.exe

    • Size

      728KB

    • MD5

      096d916600270da3e1c1d78d0288af70

    • SHA1

      f99cd749e84d0452dbe9d9fa8ea23280a6797214

    • SHA256

      d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7

    • SHA512

      73b83bffcd3b3c18398ab88d1dcb89523672fbea55b6fe2105a6c28ba428c10a2cf5251b50e0c982552867bff11eb42c96be91875c5d853e6b0474173d15c7af

    • SSDEEP

      12288:WER9K8FUeR5Z9tRvSCJ6UJUdQ3MGKTOxT8LkMAr156KuGVW9HUPXNJ5AQAh5ShNG:WELNFUeLzvFAUOdQDKTbkMATpWxU1oiI

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks