General

  • Target

    4f550eeca883fa772e5cec50c7c357591d8d24f892fa9ee416f2e780a3caf1b7.ps1

  • Size

    3KB

  • Sample

    250401-c1bl5svjy8

  • MD5

    b228c467b518134d8c53ff8612fb6446

  • SHA1

    c3eb9933f73851c7f7485813abb9711eabdb4949

  • SHA256

    4f550eeca883fa772e5cec50c7c357591d8d24f892fa9ee416f2e780a3caf1b7

  • SHA512

    21ae6179ae6df3f66268aba2762d882e47459034e790bceab17700fba4b65fa83e58d3cff86b68f146e2b8ea6cab34c8431ccc5763f0d740d4079f20522dcfab

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://tranquilityparadise.com.np/crypted.exe

exe.dropper

https://installsh.pages.dev/config.ps1

Extracted

Family

vidar

Version

13.3

Botnet

00cb84c6bd4caac4bdfc1131beae4df7

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://tranquilityparadise.com.np/crypted.exe

exe.dropper

https://installsh.pages.dev/config.ps1

Targets

    • Target

      4f550eeca883fa772e5cec50c7c357591d8d24f892fa9ee416f2e780a3caf1b7.ps1

    • Size

      3KB

    • MD5

      b228c467b518134d8c53ff8612fb6446

    • SHA1

      c3eb9933f73851c7f7485813abb9711eabdb4949

    • SHA256

      4f550eeca883fa772e5cec50c7c357591d8d24f892fa9ee416f2e780a3caf1b7

    • SHA512

      21ae6179ae6df3f66268aba2762d882e47459034e790bceab17700fba4b65fa83e58d3cff86b68f146e2b8ea6cab34c8431ccc5763f0d740d4079f20522dcfab

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks