General

  • Target

    second1111.png

  • Size

    2.4MB

  • Sample

    250213-w6bnwa1pfk

  • MD5

    f2423a37c39b9c8f3ece38fcc079f38b

  • SHA1

    77d3111ce2d3704cf59acd756082cd08870dddba

  • SHA256

    b46bd97ddb34e9cda43e4d554d9f3d9ece02d34fa5a255a6d28ed4f3c41cbaec

  • SHA512

    e093a37032ddce3d00ddf4822656872157365fa86541289800160c2876f3eddaed2e5789bb60b4fddbe60964228972b9519472ca1b4d5f3148fac8d6e257c9c5

  • SSDEEP

    49152:XFIf8Ijk8sDAMQ65MKSsVlOxAPB6HvmMiqkkB/rmfw3fVA/2uBAdd4h:XMjk8uFQFsV4x+BsviqkkBifwv2/BAda

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Targets

    • Target

      second1111.png

    • Size

      2.4MB

    • MD5

      f2423a37c39b9c8f3ece38fcc079f38b

    • SHA1

      77d3111ce2d3704cf59acd756082cd08870dddba

    • SHA256

      b46bd97ddb34e9cda43e4d554d9f3d9ece02d34fa5a255a6d28ed4f3c41cbaec

    • SHA512

      e093a37032ddce3d00ddf4822656872157365fa86541289800160c2876f3eddaed2e5789bb60b4fddbe60964228972b9519472ca1b4d5f3148fac8d6e257c9c5

    • SSDEEP

      49152:XFIf8Ijk8sDAMQ65MKSsVlOxAPB6HvmMiqkkB/rmfw3fVA/2uBAdd4h:XMjk8uFQFsV4x+BsviqkkBifwv2/BAda

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks