General
-
Target
https://mega.nz/file/n7hgFbTB#0P3vn58q-WXoc-En6zZ5Y8Lolmqfrjf5JPhUOLGT-j4
-
Sample
240222-pmdksshd66
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/n7hgFbTB#0P3vn58q-WXoc-En6zZ5Y8Lolmqfrjf5JPhUOLGT-j4
Resource
win10v2004-20240221-en
21 signatures
1800 seconds
Malware Config
Extracted
Family
vidar
Version
7.9
Botnet
c0f701b124b29a9e188f7796b890e60b
C2
https://49.13.32.193
https://t.me/hypergog
https://steamcommunity.com/profiles/76561199642171824
Attributes
-
profile_id_v2
c0f701b124b29a9e188f7796b890e60b
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Targets
-
-
Target
https://mega.nz/file/n7hgFbTB#0P3vn58q-WXoc-En6zZ5Y8Lolmqfrjf5JPhUOLGT-j4
Score10/10-
Detect Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-