General

  • Target

    Setup.exe

  • Size

    78.9MB

  • Sample

    250211-g211msypev

  • MD5

    2879c2ed17dfcdcf548cc71de5ef374b

  • SHA1

    5697a85f1f38149723a157697523f36932fa880c

  • SHA256

    c5ff8c9ec98f44163a3da8555205f97ab01392216e371fe3e9f81f142f387bb3

  • SHA512

    0cd7bb8b86470a2dc21d23ffb69a14dcd1f07896399de50a8171b76cb5e342c6a72b6b0fb7379652aa71f0ae69fc1ac30350b959906e29e2896461c9a92c7023

  • SSDEEP

    98304:Ugh4cAFlG+Jhhwb+8MeGx2RVtT42cPcUaIp2vUsMiLJ:xhRAO+UJR82SOv

Malware Config

Extracted

Family

vidar

C2

https://t.me/sok33tn

https://steamcommunity.com/profiles/76561199824159981

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      Setup.exe

    • Size

      78.9MB

    • MD5

      2879c2ed17dfcdcf548cc71de5ef374b

    • SHA1

      5697a85f1f38149723a157697523f36932fa880c

    • SHA256

      c5ff8c9ec98f44163a3da8555205f97ab01392216e371fe3e9f81f142f387bb3

    • SHA512

      0cd7bb8b86470a2dc21d23ffb69a14dcd1f07896399de50a8171b76cb5e342c6a72b6b0fb7379652aa71f0ae69fc1ac30350b959906e29e2896461c9a92c7023

    • SSDEEP

      98304:Ugh4cAFlG+Jhhwb+8MeGx2RVtT42cPcUaIp2vUsMiLJ:xhRAO+UJR82SOv

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks