General

  • Target

    S0FTWARE.rar

  • Size

    20.8MB

  • Sample

    250217-ntzwyaymcv

  • MD5

    4709e1f3f01585669f161cf99d205821

  • SHA1

    a22f4c996fa010f9a576b3db44715bedd161ecce

  • SHA256

    0c2435e614c2e120089f41d53729ebadd94d9654a65a2ed74e6eb3805501baa7

  • SHA512

    6b0f80564a3f208cbca1d439931f3447203558a90be1f195c7ea4bd3df5b2b318efee278c8015f1807cb5c8d0be04d982babd38dcfc9cb1439bd9acbd60d6bd1

  • SSDEEP

    393216:nl936aC5ZR3bDKZkEWdiM9FxxaV9DpgHx7yHlu5ltqSXua87uKv4:H36a0BdiM9YV9Dpu7glu5lcSbY4

Malware Config

Extracted

Family

vidar

C2

https://t.me/b4cha00

https://steamcommunity.com/profiles/76561199825403037

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0

Targets

    • Target

      S0FTWARE.exe

    • Size

      232KB

    • MD5

      fbd1b32c4c62e90e0cf1645f88eed890

    • SHA1

      358075963f0c935cdb7eeeec1bd7a49569d880f2

    • SHA256

      d0055eec7bf7cc140098e2a37cca3a3ee9c374326279c5ba6e8f4bd9ae3dcd75

    • SHA512

      a44135fd7de05db9e3e2c3bfa94c0144a60c33cbfdba0e20632384feb9cbe05469d5f8b499146f98af4a76a8b070b9db441309746e34ed4b351cd7c586bfa70b

    • SSDEEP

      3072:2A4WSt2GdSB+vsoFJL4BBcZIdEt/UvDmeNNMbXdOolXFVf5nSj1VrHsMdJ9MQ8m:A2Gde+vsoFJL4BSWdEt/K6eNw51rn02

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks