General

  • Target

    random.exe

  • Size

    883KB

  • Sample

    250126-p4tckssrdr

  • MD5

    9ce7b5dc80b072328c7bbcdb1c787941

  • SHA1

    7ec1102c335fc5db907c9ee2dcc0ec2ab3f6196a

  • SHA256

    d264ece444ce4f309f8abb6624a948b7e475b0ea41922a167b2c206a99a2f3ed

  • SHA512

    e559fc4c461dc51d6e528781079b5705a48190e1e1523fa88a44ea083ce4c36e26f49cc266dc7bf7e94a1a8d644c252c04a3f8a75ee75d5e13632cb55d366ebf

  • SSDEEP

    24576:92AkXmXG/wzcVn5eiBOdsd1NvyiOIMEWozYL:umXGAcVN8dsFaiXvWeu

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/sc1phell

https://steamcommunity.com/profiles/76561199819539662

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      random.exe

    • Size

      883KB

    • MD5

      9ce7b5dc80b072328c7bbcdb1c787941

    • SHA1

      7ec1102c335fc5db907c9ee2dcc0ec2ab3f6196a

    • SHA256

      d264ece444ce4f309f8abb6624a948b7e475b0ea41922a167b2c206a99a2f3ed

    • SHA512

      e559fc4c461dc51d6e528781079b5705a48190e1e1523fa88a44ea083ce4c36e26f49cc266dc7bf7e94a1a8d644c252c04a3f8a75ee75d5e13632cb55d366ebf

    • SSDEEP

      24576:92AkXmXG/wzcVn5eiBOdsd1NvyiOIMEWozYL:umXGAcVN8dsFaiXvWeu

    Score
    10/10
    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks