General

  • Target

    33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48.exe

  • Size

    865KB

  • Sample

    250124-ezlf3azjcv

  • MD5

    e7c964e5bd52da0b4ff1e6543608cf27

  • SHA1

    b369051de7f7bdf58411fb604eef85507965abf2

  • SHA256

    33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48

  • SHA512

    651dd8f2fc6c4e0c479a03111334b054a0ac0c466256e48880c5a27ce77ef0900bd9ccbe7c16607b1f4c9fa3efc4b387ddc3b371c415715025bc188fd218eb48

  • SSDEEP

    12288:gCxr3SAoHl8uj7c8BNV0CW9TBBMtVIN+9exmPh0LguCifyV03qGs7ifbVpBgYeSa:gcrCAY8uj7nGPFLWVIN+9e5iUDTq/Shk

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/sc1phell

https://steamcommunity.com/profiles/76561199819539662

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48.exe

    • Size

      865KB

    • MD5

      e7c964e5bd52da0b4ff1e6543608cf27

    • SHA1

      b369051de7f7bdf58411fb604eef85507965abf2

    • SHA256

      33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48

    • SHA512

      651dd8f2fc6c4e0c479a03111334b054a0ac0c466256e48880c5a27ce77ef0900bd9ccbe7c16607b1f4c9fa3efc4b387ddc3b371c415715025bc188fd218eb48

    • SSDEEP

      12288:gCxr3SAoHl8uj7c8BNV0CW9TBBMtVIN+9exmPh0LguCifyV03qGs7ifbVpBgYeSa:gcrCAY8uj7nGPFLWVIN+9e5iUDTq/Shk

    Score
    10/10
    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks