

Rewterz Threat Alert – Donot APT Group – Active IOCs
September 13, 2021
Rewterz Threat Alert – Quasar RAT – Active IOCs
September 13, 2021
Rewterz Threat Alert – Donot APT Group – Active IOCs
September 13, 2021
Rewterz Threat Alert – Quasar RAT – Active IOCs
September 13, 2021Severity
High
Analysis Summary
Spyware.Vidar is a product that offers threat actors the option to set their preferences for the stolen information. Besides credit card numbers and passwords, Vidar can also scrape an impressive selection of digital wallets. This spyware can be spread using various campaigns. Vidar, which originally became active in late 2018, is a family of malware that operates primarily as an information stealer and is often observed as a precursor to ransomware deployment. It enables the capture and exfiltration of data from a system, including system information, browser data, and credentials
Impact
- Data exfiltration
- Information theft
- Exposure of sensitive data
Indicators of Compromise
MD5
- dde5e3410b076b8168baa4ad94d3bb93
- a28acddfe23e9c15775ec142e927f903
- b32b5befec6b3ede50cbbe5b87a59fb1
- c15e6f1af785a5e4a33d3626791d7ea2
- b89a61be847968866f79fe565478971a
SHA-256
- 11776f78d1e87398d54f9d45b62971f30af2466db9602a2ed6cccce72193a501
- b7783ba562e48041b259fd404187259d867adc61f60e9018b74eb1b102928737
- ff203304aa7c6a409238e18665fb19c26acebaaff5ad0c246f23abecd5aa17c8
- 3a36f7c277702d1ec0d6c07b30d3b2c570de9bb21134435f27e6c9ee5f642e5f
- e2b8baf06e1bb3b53ed7d28cc01c9ae95030c4dde32f040a7438c55c7ca44674
SHA-1
- 56bf14eb9b39884825568d939ecf3505f5c0ef31
- 392815ecc5531af06f335c2c5710197aa659f83c
- 132a426a3320eca43e975d780f84a96c47e529ad
- 9724eced8e529b70aca3be3c7c7c874e997caace
- a31f6c3e739ba65c18332f8c5be3fd7dd65408b7
URL
- https[:]//securebiz[.]org/dl/build[.]exe
- http[:]//tbpws[.]top/files/1/build[.]exe
- http[:]//103[.]169[.]90[.]205/blog/upload/e9374bbefcce30c811d2f0091f1886c3[.]exe
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.