General

  • Target

    93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73.exe

  • Size

    1.4MB

  • Sample

    250213-qwb9rsypgy

  • MD5

    88414784f4e973b77bb6e801df6a3b03

  • SHA1

    22fc8ee2604b78007dc40aaa40cadd4a2838513b

  • SHA256

    93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73

  • SHA512

    35a65d048d02e34af11df2dbd2eddf081943fa3b08a36ca823b316c132a60e07ed90f25391c77b218e297d76363545960e2a728370c54fc3520a3dbca9cbfb50

  • SSDEEP

    24576:DzIkR+5tMiZjjozsjuC0x4onnjv+pEVS1Z+54W5DTE/nsuwKN+I0JALGFgipRus9:3Iy+kiZjjozkuZOina+KWZO+owJdF1pZ

Malware Config

Extracted

Family

vidar

Botnet

hu76fa

C2

https://t.me/w211et

https://steamcommunity.com/profiles/76561199811540174

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0

Targets

    • Target

      93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73.exe

    • Size

      1.4MB

    • MD5

      88414784f4e973b77bb6e801df6a3b03

    • SHA1

      22fc8ee2604b78007dc40aaa40cadd4a2838513b

    • SHA256

      93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73

    • SHA512

      35a65d048d02e34af11df2dbd2eddf081943fa3b08a36ca823b316c132a60e07ed90f25391c77b218e297d76363545960e2a728370c54fc3520a3dbca9cbfb50

    • SSDEEP

      24576:DzIkR+5tMiZjjozsjuC0x4onnjv+pEVS1Z+54W5DTE/nsuwKN+I0JALGFgipRus9:3Iy+kiZjjozkuZOina+KWZO+owJdF1pZ

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks