General

  • Target

    crypted.exe

  • Size

    1.2MB

  • Sample

    250330-y43exsylt5

  • MD5

    b12e6c33aaa13c1e79772ef9817c69f7

  • SHA1

    e8d7ad2964419f9324e37016e5d6e2763184ad62

  • SHA256

    37fe77ebb9e0a268328482308d6779b0f5f08e4553833c9ac2da10492a55e8b3

  • SHA512

    c24f6a289c36d57396b3287a9db981280eadf84be583359d0d01ab4ee4553b80365134dca62c89ad7575e07e3c039aa10f4a2d37d230e81660f46a287b8a95eb

  • SSDEEP

    12288:VGQn7ZDgpAW8VTOzIUfVX5CF/ED2Na1n+gaG7rOqKa5OxaOlt1HZEzoYBcOxzKO5:Z23rzD2NaVDgdfE8Ac7BFUNppZwrlUR

Malware Config

Extracted

Family

vidar

Version

13.3

Botnet

00cb84c6bd4caac4bdfc1131beae4df7

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Targets

    • Target

      crypted.exe

    • Size

      1.2MB

    • MD5

      b12e6c33aaa13c1e79772ef9817c69f7

    • SHA1

      e8d7ad2964419f9324e37016e5d6e2763184ad62

    • SHA256

      37fe77ebb9e0a268328482308d6779b0f5f08e4553833c9ac2da10492a55e8b3

    • SHA512

      c24f6a289c36d57396b3287a9db981280eadf84be583359d0d01ab4ee4553b80365134dca62c89ad7575e07e3c039aa10f4a2d37d230e81660f46a287b8a95eb

    • SSDEEP

      12288:VGQn7ZDgpAW8VTOzIUfVX5CF/ED2Na1n+gaG7rOqKa5OxaOlt1HZEzoYBcOxzKO5:Z23rzD2NaVDgdfE8Ac7BFUNppZwrlUR

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks