General

  • Target

    pothjasefdj.exe

  • Size

    120KB

  • Sample

    250212-z9v4gaykgp

  • MD5

    c6ddc5c9dad56fd85bf6199b38c09120

  • SHA1

    299bc508a4c1a603789b7c5aa166713b3428f2e0

  • SHA256

    d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841

  • SHA512

    41668f9c2231769aa8c919166b964d0161b2cde4c0efd175b5f3bdb25906496ed045366fb1c25439663e98f483f43bc4e56fa4891abd3cd5abb3bbbfdcf69e40

  • SSDEEP

    3072:FEFRh0auCcJVwDjwzTC2SCn/FtVQenIuxIGWsnRR9pLTfQvXeD:W3h0aMJ+Hw3Pgen79/IvO

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Targets

    • Target

      pothjasefdj.exe

    • Size

      120KB

    • MD5

      c6ddc5c9dad56fd85bf6199b38c09120

    • SHA1

      299bc508a4c1a603789b7c5aa166713b3428f2e0

    • SHA256

      d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841

    • SHA512

      41668f9c2231769aa8c919166b964d0161b2cde4c0efd175b5f3bdb25906496ed045366fb1c25439663e98f483f43bc4e56fa4891abd3cd5abb3bbbfdcf69e40

    • SSDEEP

      3072:FEFRh0auCcJVwDjwzTC2SCn/FtVQenIuxIGWsnRR9pLTfQvXeD:W3h0aMJ+Hw3Pgen79/IvO

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks