General

  • Target

    884c8595250427c245264532b41f29334691e9b21b3526e9acb261a5952be10f.ps1

  • Size

    3KB

  • Sample

    250330-yrl76sv1hz

  • MD5

    eb268445cfc78545bacae46af1b5f268

  • SHA1

    82a4feb89a8f2240778e1d49b401e8d28fb0f718

  • SHA256

    884c8595250427c245264532b41f29334691e9b21b3526e9acb261a5952be10f

  • SHA512

    c19cfbe8e0b84ec9f84e6cf6153d253ae89bb868d775b21e69f5645ad16e4df9eeb4b4d039ba6bd050349448cccd811dc5e58e203cdcd43bbfea35c050274f8a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://jacrcell.com/joomla/crypted.exe

exe.dropper

https://installsh.pages.dev/config.ps1

Extracted

Family

vidar

Version

13.3

Botnet

00cb84c6bd4caac4bdfc1131beae4df7

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://jacrcell.com/joomla/crypted.exe

exe.dropper

https://installsh.pages.dev/config.ps1

Targets

    • Target

      884c8595250427c245264532b41f29334691e9b21b3526e9acb261a5952be10f.ps1

    • Size

      3KB

    • MD5

      eb268445cfc78545bacae46af1b5f268

    • SHA1

      82a4feb89a8f2240778e1d49b401e8d28fb0f718

    • SHA256

      884c8595250427c245264532b41f29334691e9b21b3526e9acb261a5952be10f

    • SHA512

      c19cfbe8e0b84ec9f84e6cf6153d253ae89bb868d775b21e69f5645ad16e4df9eeb4b4d039ba6bd050349448cccd811dc5e58e203cdcd43bbfea35c050274f8a

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks