General

  • Target

    291f381da3286ea93c38bb325e19f35744349c3543708135d8be731f4bafb6e2.exe

  • Size

    545KB

  • Sample

    250124-ew83yszrgl

  • MD5

    54bef758433c98353b61bf1e2aecefb2

  • SHA1

    06feb43c6d58eab893396f63aa2e1d0e4542f7d1

  • SHA256

    291f381da3286ea93c38bb325e19f35744349c3543708135d8be731f4bafb6e2

  • SHA512

    3bfb51f9bee7033ebde0f418b88327b7c7a322b3e0572d92ad4cdf37c9fbed22d518c9ce2d8d5638381542bef83077d8054184b9f613b815df6906a99fd4526f

  • SSDEEP

    12288:fPT9h+l+ofoa/sHoNFU9Zd1jWOYE9QjmJl/2hgDMjhP:fPT9hifJKZd1jWOY2emPOuDMd

Malware Config

Extracted

Family

vidar

Version

26.1

Botnet

276

C2

http://centos10.com/

Attributes
  • profile_id

    276

Targets

    • Target

      291f381da3286ea93c38bb325e19f35744349c3543708135d8be731f4bafb6e2.exe

    • Size

      545KB

    • MD5

      54bef758433c98353b61bf1e2aecefb2

    • SHA1

      06feb43c6d58eab893396f63aa2e1d0e4542f7d1

    • SHA256

      291f381da3286ea93c38bb325e19f35744349c3543708135d8be731f4bafb6e2

    • SHA512

      3bfb51f9bee7033ebde0f418b88327b7c7a322b3e0572d92ad4cdf37c9fbed22d518c9ce2d8d5638381542bef83077d8054184b9f613b815df6906a99fd4526f

    • SSDEEP

      12288:fPT9h+l+ofoa/sHoNFU9Zd1jWOYE9QjmJl/2hgDMjhP:fPT9hifJKZd1jWOY2emPOuDMd

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks