Behavioral task
behavioral1
Sample
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe
Resource
win10v2004-20231222-en
General
-
Target
9cc5ab9f921d3d7cb2e627fc9a89e901.bin
-
Size
140KB
-
MD5
592f6181198ad76c8eb18d815714ad96
-
SHA1
297ff1169e6e6999742930a052dea8b579d876d9
-
SHA256
8e80760e89a66fcef6e11650bb201daf5203c9daf9a948092e297882e9cdcf62
-
SHA512
a666c44c58318022c7b4eebb875d8a8701acd7c68e7865f83d87fb25c0ee2fae39c7ce51ef07ce448a2f3e2783040651aa9cfb5effd3bc081a855018aa856c07
-
SSDEEP
3072:c9y7gVbFQC57nLQMeaO4hxo39voQlWtTpl0D993oduw:sycVbFQ+7nkMPhxKvvWt1lMftw
Malware Config
Signatures
-
Detect Vidar Stealer 1 IoCs
resource yara_rule static1/unpack001/32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe family_vidar_v6 -
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe
Files
-
9cc5ab9f921d3d7cb2e627fc9a89e901.bin.zip
Password: infected
-
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe.exe windows:5 windows x86 arch:x86
Password: infected
bcf77c2c3cd3748f83f9c44cda23fdb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strchr
strcpy_s
??_U@YAPAXI@Z
__CxxFrameHandler3
memcpy
strncpy
malloc
_wtoi64
atexit
??_V@YAXPAX@Z
memmove
memchr
strtok_s
memset
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapSize
VirtualFree
VirtualAlloc
ExitProcess
VirtualAllocExNuma
GetCurrentProcess
GetUserDefaultLCID
lstrlenA
LocalAlloc
ReadProcessMemory
VirtualQueryEx
OpenProcess
FileTimeToSystemTime
CloseHandle
WaitForSingleObject
CreateThread
GetDriveTypeA
GetLogicalDriveStringsA
GetProcAddress
LoadLibraryA
GetStringTypeW
MultiByteToWideChar
GetLocaleInfoA
EnumSystemLocalesA
lstrcmpiW
UnhandledExceptionFilter
LCMapStringW
WideCharToMultiByte
HeapSetInformation
GetCommandLineA
HeapReAlloc
HeapAlloc
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
IsValidCodePage
GetOEMCP
RaiseException
GetLastError
HeapFree
DecodePointer
EncodePointer
IsValidLocale
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
RtlUnwind
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
WriteFile
GetStdHandle
GetModuleFileNameW
SetConsoleCtrlHandler
GetCPInfo
GetACP
user32
CharToOemA
advapi32
RegOpenKeyExA
RegGetValueA
GetCurrentHwProfileA
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
ord155
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ