General

  • Target

    .

  • Size

    564B

  • Sample

    250213-px5r2aylcx

  • MD5

    551e6e8316330ea362856c8f4fc249ed

  • SHA1

    791ff927a99dff2ebae3c7b2fe90eac49e1721c5

  • SHA256

    8548215da9bc3fa053e973155fb99462a65aea8b9ee8f6419a1d2c11ca0189f6

  • SHA512

    eda2d472d73436940d33c4caaa75ccb160fdb001507ef1d481d4e98d3084160c4983409dee03538e16a0c77d7fc85f2ebd16b13bb408b44475a7ebea73f1eec4

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Targets

    • Target

      .

    • Size

      564B

    • MD5

      551e6e8316330ea362856c8f4fc249ed

    • SHA1

      791ff927a99dff2ebae3c7b2fe90eac49e1721c5

    • SHA256

      8548215da9bc3fa053e973155fb99462a65aea8b9ee8f6419a1d2c11ca0189f6

    • SHA512

      eda2d472d73436940d33c4caaa75ccb160fdb001507ef1d481d4e98d3084160c4983409dee03538e16a0c77d7fc85f2ebd16b13bb408b44475a7ebea73f1eec4

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks