General

  • Target

    2025-02-14_b27f82232705f46c872db1b71a4aa755_frostygoop_poet-rat_snatch

  • Size

    5.6MB

  • Sample

    250214-d56ths1jfn

  • MD5

    b27f82232705f46c872db1b71a4aa755

  • SHA1

    aaed5c68952124ab06dc9a54ede30344fd05fec5

  • SHA256

    dc90777bd03548942ed4b0a37ec03bb527225e56bfa7cd13ba36a73fd1dec123

  • SHA512

    3c920dd4e4db43db0def356d48a7f9bb17866f2b1106fe11478ebc04c318daf6a6c94e586b7396c009cf001a5548c1993b4a6956a408504189eff16a8ab023c5

  • SSDEEP

    49152:PJiTLxmrxMgiQNXf34SF0VwUhu6NqQFn8vca9Ypyy7KQ+cKa/Et9m3OnytR1ljyc:P0TLxmFkQNXgU0ZqXHfaj3OQjy

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/sok33tn

https://steamcommunity.com/profiles/76561199824159981

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Targets

    • Target

      2025-02-14_b27f82232705f46c872db1b71a4aa755_frostygoop_poet-rat_snatch

    • Size

      5.6MB

    • MD5

      b27f82232705f46c872db1b71a4aa755

    • SHA1

      aaed5c68952124ab06dc9a54ede30344fd05fec5

    • SHA256

      dc90777bd03548942ed4b0a37ec03bb527225e56bfa7cd13ba36a73fd1dec123

    • SHA512

      3c920dd4e4db43db0def356d48a7f9bb17866f2b1106fe11478ebc04c318daf6a6c94e586b7396c009cf001a5548c1993b4a6956a408504189eff16a8ab023c5

    • SSDEEP

      49152:PJiTLxmrxMgiQNXf34SF0VwUhu6NqQFn8vca9Ypyy7KQ+cKa/Et9m3OnytR1ljyc:P0TLxmFkQNXgU0ZqXHfaj3OQjy

    Score
    10/10
    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks