General

  • Target

    9f680720826812af34cbc66e27e0281f.exe

  • Size

    6.2MB

  • Sample

    250213-pc9v9ayjfw

  • MD5

    9f680720826812af34cbc66e27e0281f

  • SHA1

    fb580afbf6fb913e83eea1fb99be9c95b6ec39d5

  • SHA256

    19198e75f7c830441360a42b06e10415f4368300a7590c119c237ea8c67bf23e

  • SHA512

    482fb7ca414b9070849017a9ec390597dd6fb1a18cb7e819b498b786dc1467dadd928d2f054baec880307274296f6b66a971deb63b14f0fc27f39094fcb2be8e

  • SSDEEP

    49152:QU4K1Qy8nPDdZiBSFfscuj9ADJZlShhV7+pXLRB5TYAUhJSh7DUtiGlMlHDNuc6X:QNbrnrShj9AVYhgB5IJsnUw918SvljW

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Targets

    • Target

      9f680720826812af34cbc66e27e0281f.exe

    • Size

      6.2MB

    • MD5

      9f680720826812af34cbc66e27e0281f

    • SHA1

      fb580afbf6fb913e83eea1fb99be9c95b6ec39d5

    • SHA256

      19198e75f7c830441360a42b06e10415f4368300a7590c119c237ea8c67bf23e

    • SHA512

      482fb7ca414b9070849017a9ec390597dd6fb1a18cb7e819b498b786dc1467dadd928d2f054baec880307274296f6b66a971deb63b14f0fc27f39094fcb2be8e

    • SSDEEP

      49152:QU4K1Qy8nPDdZiBSFfscuj9ADJZlShhV7+pXLRB5TYAUhJSh7DUtiGlMlHDNuc6X:QNbrnrShj9AVYhgB5IJsnUw918SvljW

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks