General

  • Target

    b112123f490a0505d0c2722abc65d1285865c519ec9587fe72e988c38fc1fcbc.exe

  • Size

    1.1MB

  • Sample

    250213-q4x67sylck

  • MD5

    db05af12adf9bec6dc7db5e6b63cd537

  • SHA1

    8d7a89dff4a989db353bd6eb06c4e10e10a744ab

  • SHA256

    b112123f490a0505d0c2722abc65d1285865c519ec9587fe72e988c38fc1fcbc

  • SHA512

    ecc98822ffffee1ec2d8d16cbfde32813a20e0f1f3c4f16d40599b101be7dcc0413c0c492aa61c53845a290de727f8b2a18e12acb45e80b1bf442214db30c9dc

  • SSDEEP

    24576:NFXdWAia2MERpto++TmyY1rY0cfz3hCywFGp9RR2vSuzfb7Tb7j:bU2Jm1J+RCfFaRRSSu7

Malware Config

Extracted

Family

vidar

Botnet

fc0stn

C2

https://t.me/w0ctzn

https://steamcommunity.com/profiles/76561199817305251

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0

Targets

    • Target

      b112123f490a0505d0c2722abc65d1285865c519ec9587fe72e988c38fc1fcbc.exe

    • Size

      1.1MB

    • MD5

      db05af12adf9bec6dc7db5e6b63cd537

    • SHA1

      8d7a89dff4a989db353bd6eb06c4e10e10a744ab

    • SHA256

      b112123f490a0505d0c2722abc65d1285865c519ec9587fe72e988c38fc1fcbc

    • SHA512

      ecc98822ffffee1ec2d8d16cbfde32813a20e0f1f3c4f16d40599b101be7dcc0413c0c492aa61c53845a290de727f8b2a18e12acb45e80b1bf442214db30c9dc

    • SSDEEP

      24576:NFXdWAia2MERpto++TmyY1rY0cfz3hCywFGp9RR2vSuzfb7Tb7j:bU2Jm1J+RCfFaRRSSu7

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks