General

  • Target

    2025-02-07_b2001556255de91fac3580c11798ab55_frostygoop_hijackloader_poet-rat_snatch

  • Size

    4.5MB

  • Sample

    250207-z8tt1sylbw

  • MD5

    b2001556255de91fac3580c11798ab55

  • SHA1

    3401301680f24e7cca14656a803fe725e961bec9

  • SHA256

    7c0d04c2bd129c20a9e836954e548482b7c54db3612076f1113909495f052db9

  • SHA512

    54c733c5a0d461d4ab0d18e63d2b960e6d6a07163bee29d81b23354f0886bb2cd90452ca0b6008800a7e8f471894d095ba97b4b697efd53aefcbfa552740a7e2

  • SSDEEP

    49152:wYAyOIfdsbFR+ywdYFe0vLTj8TLVwl9q3PnPkGVzM2c4SQjFf6x1to3:w7yOMQR+ywWw04T5nmujMo3

Malware Config

Extracted

Family

vidar

C2

https://t.me/sok33tn

https://steamcommunity.com/profiles/76561199824159981

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      2025-02-07_b2001556255de91fac3580c11798ab55_frostygoop_hijackloader_poet-rat_snatch

    • Size

      4.5MB

    • MD5

      b2001556255de91fac3580c11798ab55

    • SHA1

      3401301680f24e7cca14656a803fe725e961bec9

    • SHA256

      7c0d04c2bd129c20a9e836954e548482b7c54db3612076f1113909495f052db9

    • SHA512

      54c733c5a0d461d4ab0d18e63d2b960e6d6a07163bee29d81b23354f0886bb2cd90452ca0b6008800a7e8f471894d095ba97b4b697efd53aefcbfa552740a7e2

    • SSDEEP

      49152:wYAyOIfdsbFR+ywdYFe0vLTj8TLVwl9q3PnPkGVzM2c4SQjFf6x1to3:w7yOMQR+ywWw04T5nmujMo3

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks