General
-
Target
0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98
-
Size
218KB
-
Sample
240306-v4xmwsdg73
-
MD5
d0cad5f509cc6d672b5f3f0ec1d6f644
-
SHA1
81b55f806ce017997b45475b14bcd6f323d70c1f
-
SHA256
0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98
-
SHA512
6a8506c9dac07cb0ba421de933eb79aa33e6b8cc9ac1c950d25c07c2d22225ea5a22588b7da58111f581c7621af77384b389d6bf7fb5e74f7db083fa11a7548d
-
SSDEEP
3072:0uMTUImQzMj/HT5jHsYN/sUXaQqlEEWkBJpT3lX1Nl3Z9k9x8vba/y+W/6xMGkGn:xMTUR/1UxfWoDlfloxwuW/6x5kG+
Static task
static1
Behavioral task
behavioral1
Sample
0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
vidar
8
438c7562661d92141bb0adbe01c2fc5f
https://steamcommunity.com/profiles/76561199644883218
https://t.me/neoschats
-
profile_id_v2
438c7562661d92141bb0adbe01c2fc5f
-
user_agent
Mozilla/5.0 (Linux; Android 11; M2102J20SG) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Mobile Safari/537.36 EdgA/97.0.1072.78
Targets
-
-
Target
0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98
-
Size
218KB
-
MD5
d0cad5f509cc6d672b5f3f0ec1d6f644
-
SHA1
81b55f806ce017997b45475b14bcd6f323d70c1f
-
SHA256
0db6c55f1cc3a007725efaac207f2a904435097a05260468c05559ec8cfdfd98
-
SHA512
6a8506c9dac07cb0ba421de933eb79aa33e6b8cc9ac1c950d25c07c2d22225ea5a22588b7da58111f581c7621af77384b389d6bf7fb5e74f7db083fa11a7548d
-
SSDEEP
3072:0uMTUImQzMj/HT5jHsYN/sUXaQqlEEWkBJpT3lX1Nl3Z9k9x8vba/y+W/6xMGkGn:xMTUR/1UxfWoDlfloxwuW/6x5kG+
Score10/10-
Detect Vidar Stealer
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-