General

  • Target

    Application_x32_x64_Setup.rar

  • Size

    116.7MB

  • Sample

    250303-cc6sdasr19

  • MD5

    6f9d81fabb624fb12b4cab01e112a934

  • SHA1

    918f6c2b15f15a20aa7c3653daee727b0f95e065

  • SHA256

    78dcdac4b4816f6e692a311964f26cb56008cddd4d737e4e1f9219d1e2268d7b

  • SHA512

    2c5fdf3421fca82ba8e6eafc29f0cb785e5351f6c3d9f33e2437f4481a5c934ea315592d87fc07e270b0d328cb4938f12f1409a483a80014bb97e4ca6b8773c6

  • SSDEEP

    3145728:k9V7tlK02gSAogXNri1xIzJVIQ8qjS1sUUS+DcIO:ybK0+A9BikXtiCScS

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://yaykisobakitop.top/kjlrfejkrfkrerfk3fkfrkerlkfr3ejhkRKFJKERKJFREWKJ34JK34JKDWK/lica

exe.dropper

https://yaykisobakitop.top/kjlrfejkrfkrerfk3fkfrkerlkfr3ejhkRKFJKERKJFREWKJ34JK34JKDWK/lica

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Targets

    • Target

      Application_x32_x64_Setup.rar

    • Size

      116.7MB

    • MD5

      6f9d81fabb624fb12b4cab01e112a934

    • SHA1

      918f6c2b15f15a20aa7c3653daee727b0f95e065

    • SHA256

      78dcdac4b4816f6e692a311964f26cb56008cddd4d737e4e1f9219d1e2268d7b

    • SHA512

      2c5fdf3421fca82ba8e6eafc29f0cb785e5351f6c3d9f33e2437f4481a5c934ea315592d87fc07e270b0d328cb4938f12f1409a483a80014bb97e4ca6b8773c6

    • SSDEEP

      3145728:k9V7tlK02gSAogXNri1xIzJVIQ8qjS1sUUS+DcIO:ybK0+A9BikXtiCScS

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks