General

  • Target

    aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.zip

  • Size

    285KB

  • Sample

    250208-t671zaxkck

  • MD5

    db2495ef28f8b32e927c048526b60af3

  • SHA1

    60ee8de6255da85f99d1670a8f59fa41bc64531a

  • SHA256

    44b6943b892a5d5268857efa67cd5a2afe60852bd321aceba607ada1fed0d2cd

  • SHA512

    ce243a4a8b330290a4d98a7ee677217a02eb9066ddc499f1d3cc52d70289d36f13e3090acce65e73de03ff631d771cd6dbc284a5be0fc1834d0c059f8c01b7f5

  • SSDEEP

    6144:uZxigbPAl9P7e6SHZpG/W6wZ8EavbmK9jxRtwAjk3t7c4699T5w:uZzWDGfPZ8EaTXnfjk3t7+99T5w

Malware Config

Extracted

Family

vidar

C2

https://t.me/sok33tn

https://steamcommunity.com/profiles/76561199824159981

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.exe

    • Size

      360KB

    • MD5

      216340f456c7adb3db07da2b551e1066

    • SHA1

      a9623a90d83ac30a74f52ff9042647d4dad473ec

    • SHA256

      aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1

    • SHA512

      8625016bf03fb6b1cedf18371eb2fafa77f10df33ebf09ffa74ca0d79616dbf5544c72ab85317e06d8a8a97980b23681dddf88ce3df06f8df4f3ba68b15c3cbb

    • SSDEEP

      6144:O/a19BSfmQl2G0GI++lx19BSfmQl2G0GI++lM:P19inIT19inIe

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks