General

  • Target

    8a371d33f7b7305f15ac97f331b13ee3.exe

  • Size

    1.0MB

  • Sample

    250201-ta64ss1ler

  • MD5

    8a371d33f7b7305f15ac97f331b13ee3

  • SHA1

    957ed023f42215ec1034cd813d7047014d28b314

  • SHA256

    bd9f73e63ac57f56c23dda08edc1932fe8dfd33fde7e3d1a3014c881988eb1a7

  • SHA512

    95f08b4d40c5fced40b4f8a82823413639287912609c7aecac97e5a00bc07876bc059b5034516b70d8ad1f030d1f59d1e0fe28e974354ddbb6bbed2b76af547c

  • SSDEEP

    24576:26FQppKd9CO9bjajGmd9XIvG3L9hqo3qXdFk7dW:JFem0OwjbdYBo3q40

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/m08mbk

https://steamcommunity.com/profiles/76561199820567237

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      8a371d33f7b7305f15ac97f331b13ee3.exe

    • Size

      1.0MB

    • MD5

      8a371d33f7b7305f15ac97f331b13ee3

    • SHA1

      957ed023f42215ec1034cd813d7047014d28b314

    • SHA256

      bd9f73e63ac57f56c23dda08edc1932fe8dfd33fde7e3d1a3014c881988eb1a7

    • SHA512

      95f08b4d40c5fced40b4f8a82823413639287912609c7aecac97e5a00bc07876bc059b5034516b70d8ad1f030d1f59d1e0fe28e974354ddbb6bbed2b76af547c

    • SSDEEP

      24576:26FQppKd9CO9bjajGmd9XIvG3L9hqo3qXdFk7dW:JFem0OwjbdYBo3q40

    Score
    10/10
    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks