General

  • Target

    7nSTXG6.exe_pw_infected.zip

  • Size

    4.2MB

  • Sample

    250221-vvytlawpek

  • MD5

    d69f57d9ee0d0297353f67cefc83857b

  • SHA1

    206dd630d45f433ea0273ae4cceaf572a78fd456

  • SHA256

    85c4c3122b769f39036dfbc5d6ce5285b8392501644f8ede88c2bd5aa0109a24

  • SHA512

    e851563c70bf8841de8fa084f0db2fb018508684dad1bbcc8bcf8cc88b2c191240d7481d8c74ce17ff0d73eda9c301eded136be4ae4c5f9bbb7bb0564f3004e2

  • SSDEEP

    98304:9UKXPVjNMf7iqpyonWGQgT3KVNBsBFAtsJnjWgR2a:KCPVZMf+qkonBQy3KVLEiCp

Malware Config

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Targets

    • Target

      0x0005000000019615-131

    • Size

      9.8MB

    • MD5

      6de71b0609cb1dcb47118be17d0d700c

    • SHA1

      98abf52de91ec36ac0d066345ecb8b2c96fdba50

    • SHA256

      55a16f01b6e2b0b124a1c4221e6d7b27dd4571b9b6b7575c3a731cc2b2d1a0e4

    • SHA512

      a0e01518116715d8e0196e09cf4036bf484eaa250b36151bf91fc91b3bd6bdca90cb7277ebc62e16a8c2d77d75f9ade558037cc6662e12aa8e85d02ac6d8c212

    • SSDEEP

      98304:Owk7LhMpZoJaUfW8+3CPPEuSPawmHvhfcmTVbeGG0u:Lk3h82+3CyawmHvumTVbeGG

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks