Resubmissions

25/02/2025, 09:19

250225-laka2askt2 10

25/02/2025, 09:14

250225-k7t13a1r16 10

General

  • Target

    Application_x32_x64.rar

  • Size

    115.8MB

  • Sample

    250225-k7t13a1r16

  • MD5

    aa95156b97009ff8f8b052473dd672e6

  • SHA1

    ac7f4e7933d90940444f1a4e754eb8e2901033e8

  • SHA256

    dbc1850dcf3759cfb4a968693c812db1110d693cdfb4f54353a5d6e98637a3cd

  • SHA512

    00435e85561ae44347b6bbee74dda59a646a880a000bd2d3b7d1a31e8f8c81c146579735bedbb8fedcba614998dfbc0747eb65320b2ed3a8f8ec6cd433093a0d

  • SSDEEP

    3145728:u9V7tlK02gSANgXNri1xIzJVIQ8qjS1sUUS+DVLB:kbK0+AuBikXtiCScb

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://yaykisobakitop.top/kjlrfejkrfkrerfk3fkfrkerlkfr3ejhkRKFJKERKJFREWKJ34JK34JKDWK/lica

exe.dropper

https://yaykisobakitop.top/kjlrfejkrfkrerfk3fkfrkerlkfr3ejhkRKFJKERKJFREWKJ34JK34JKDWK/lica

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Targets

    • Target

      Application_x32_x64.rar

    • Size

      115.8MB

    • MD5

      aa95156b97009ff8f8b052473dd672e6

    • SHA1

      ac7f4e7933d90940444f1a4e754eb8e2901033e8

    • SHA256

      dbc1850dcf3759cfb4a968693c812db1110d693cdfb4f54353a5d6e98637a3cd

    • SHA512

      00435e85561ae44347b6bbee74dda59a646a880a000bd2d3b7d1a31e8f8c81c146579735bedbb8fedcba614998dfbc0747eb65320b2ed3a8f8ec6cd433093a0d

    • SSDEEP

      3145728:u9V7tlK02gSANgXNri1xIzJVIQ8qjS1sUUS+DVLB:kbK0+AuBikXtiCScb

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks