General

  • Target

    Setuper_25.01.exe

  • Size

    67.7MB

  • Sample

    250125-ztkmsszmgw

  • MD5

    626f51544f775502a39adc747c31032c

  • SHA1

    b4b66766714ab53be82143ab81424b98a8cbac64

  • SHA256

    35d601f9d756bcc17a3b1311306eac3bf859c891feca5a218fdf220dcdc643ff

  • SHA512

    6871ee61a12d692bd535125cdb101f1b8265e7707083070e29c189c69cdccc238c8659deb3995e4245bd1000bf9995caa783443102ffd7bc2754d8c70f5313e0

  • SSDEEP

    393216:87eLd/nhouIETpkFh8KbodSLFBJbHRlLieEY9qIjAgOWT2ZR0HYaqz1T67bGjeBm:LLd/WbbMWlLi6TjD4FeBgriZApI/Bi

Malware Config

Extracted

Family

vidar

C2

https://t.me/sc1phell

https://steamcommunity.com/profiles/76561199819539662

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      Setuper_25.01.exe

    • Size

      67.7MB

    • MD5

      626f51544f775502a39adc747c31032c

    • SHA1

      b4b66766714ab53be82143ab81424b98a8cbac64

    • SHA256

      35d601f9d756bcc17a3b1311306eac3bf859c891feca5a218fdf220dcdc643ff

    • SHA512

      6871ee61a12d692bd535125cdb101f1b8265e7707083070e29c189c69cdccc238c8659deb3995e4245bd1000bf9995caa783443102ffd7bc2754d8c70f5313e0

    • SSDEEP

      393216:87eLd/nhouIETpkFh8KbodSLFBJbHRlLieEY9qIjAgOWT2ZR0HYaqz1T67bGjeBm:LLd/WbbMWlLi6TjD4FeBgriZApI/Bi

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks