General

  • Target

    S0FTWARE.rar

  • Size

    17.1MB

  • Sample

    250206-vczyyasndj

  • MD5

    4f4d6b8038f0161743a0417cf4075e3a

  • SHA1

    5af34fbd37ebd0ff8061a0f8d7cb513ab56cebf2

  • SHA256

    b6fc49b8355a266c4914ebdb0ed7f00820c393bd5c1f136049480e08e8af4309

  • SHA512

    6b3a9c8c567a6fb445bfdb13e51537aea77fedbe5b471b0889815eb782791f15e6b1e4a0d4e7a850d29e86f078b65e8e7ecd0e4e4de8cd1ce8b8b2fcba5647a8

  • SSDEEP

    393216:bvw+bRdjNzBnHt+XhuNADR2zZHtE12RFeWkXn9fD+dIKVBtcbNlfHX0W7v:bvwuRPzBnHt+0SF2dHtEgv2n9fydIKVA

Malware Config

Extracted

Family

vidar

C2

https://t.me/sok33tn

https://steamcommunity.com/profiles/76561199824159981

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      S0FTWARE.rar

    • Size

      17.1MB

    • MD5

      4f4d6b8038f0161743a0417cf4075e3a

    • SHA1

      5af34fbd37ebd0ff8061a0f8d7cb513ab56cebf2

    • SHA256

      b6fc49b8355a266c4914ebdb0ed7f00820c393bd5c1f136049480e08e8af4309

    • SHA512

      6b3a9c8c567a6fb445bfdb13e51537aea77fedbe5b471b0889815eb782791f15e6b1e4a0d4e7a850d29e86f078b65e8e7ecd0e4e4de8cd1ce8b8b2fcba5647a8

    • SSDEEP

      393216:bvw+bRdjNzBnHt+XhuNADR2zZHtE12RFeWkXn9fD+dIKVBtcbNlfHX0W7v:bvwuRPzBnHt+0SF2dHtEgv2n9fydIKVA

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks