General

  • Target

    lem.exe

  • Size

    888KB

  • Sample

    250126-r1m3hatqas

  • MD5

    ad2ccaab29318002cd1b01b97eb4af02

  • SHA1

    44eebe4c043cdd3393038576ddbdd59a26d9c03d

  • SHA256

    bb1c808ad6d989df052a90e9a09d4e299c60c1a503310ed36e0281c97c37abed

  • SHA512

    b16e7d4ef5ac83ee1759599f85188ea062f79b6e57536a468808bab1c4ed5531f30010b0a7d43e1ea3b00a00bcef198dd8b9659e91fd776e96fd53860c04cea2

  • SSDEEP

    24576:bHsi1aK6TTfwfKsL0Q1wxkAoeaah0v1NQ3w3:zs/fPVQwf260v1S3w3

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/sc1phell

https://steamcommunity.com/profiles/76561199819539662

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      lem.exe

    • Size

      888KB

    • MD5

      ad2ccaab29318002cd1b01b97eb4af02

    • SHA1

      44eebe4c043cdd3393038576ddbdd59a26d9c03d

    • SHA256

      bb1c808ad6d989df052a90e9a09d4e299c60c1a503310ed36e0281c97c37abed

    • SHA512

      b16e7d4ef5ac83ee1759599f85188ea062f79b6e57536a468808bab1c4ed5531f30010b0a7d43e1ea3b00a00bcef198dd8b9659e91fd776e96fd53860c04cea2

    • SSDEEP

      24576:bHsi1aK6TTfwfKsL0Q1wxkAoeaah0v1NQ3w3:zs/fPVQwf260v1S3w3

    Score
    10/10
    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks