Overview
overview
10Static
static
3bd2.exe
windows7-x64
3bd2.exe
windows10-1703-x64
10bd2.exe
windows10-2004-x64
10bd2.exe
windows11-21h2-x64
10⠨/start.vbs
windows7-x64
⠨/start.vbs
windows10-1703-x64
⠨/start.vbs
windows10-2004-x64
⠨/start.vbs
windows11-21h2-x64
⠨/temp.bat
windows7-x64
⠨/temp.bat
windows10-1703-x64
⠨/temp.bat
windows10-2004-x64
⠨/temp.bat
windows11-21h2-x64
General
-
Target
bd2.exe
-
Size
271KB
-
Sample
240327-2vq73sgd8z
-
MD5
8b8db4eaa6f5368eb5f64359c6197b43
-
SHA1
e9b51842e2d2f39fa06e466ae73af341ddffe1c8
-
SHA256
55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77
-
SHA512
4da734da30af148f246f433b71c72677b9f78698424db15eba364233dff183cb998f9be13d2832872829ac545be1e15ff75ceb85fca3fd0784265fd576db0056
-
SSDEEP
6144:xfL+oq+hnjsVl3dRQTLU+2bRRR17+fYHPfIMDPSBJ7Y/B4aSi3V:xfL5njsVlNuc++Rj17+fYHPfIg4Y54ap
Static task
static1
Behavioral task
behavioral1
Sample
bd2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd2.exe
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
bd2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
bd2.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
⠨/start.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
⠨/start.vbs
Resource
win10-20240214-en
Behavioral task
behavioral7
Sample
⠨/start.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
⠨/start.vbs
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
⠨/temp.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
⠨/temp.bat
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
⠨/temp.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
⠨/temp.bat
Resource
win11-20240214-en
Malware Config
Extracted
vidar
8.6
72f54d93118188013f2386eef7e5cc05
https://steamcommunity.com/profiles/76561199658817715
https://t.me/sa9ok
-
profile_id_v2
72f54d93118188013f2386eef7e5cc05
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
Targets
-
-
Target
bd2.exe
-
Size
271KB
-
MD5
8b8db4eaa6f5368eb5f64359c6197b43
-
SHA1
e9b51842e2d2f39fa06e466ae73af341ddffe1c8
-
SHA256
55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77
-
SHA512
4da734da30af148f246f433b71c72677b9f78698424db15eba364233dff183cb998f9be13d2832872829ac545be1e15ff75ceb85fca3fd0784265fd576db0056
-
SSDEEP
6144:xfL+oq+hnjsVl3dRQTLU+2bRRR17+fYHPfIMDPSBJ7Y/B4aSi3V:xfL5njsVlNuc++Rj17+fYHPfIg4Y54ap
Score10/10-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
-
-
Target
⠨/start.vbs
-
Size
231B
-
MD5
abe1dd23ab4c11aae54f1898c780c0b5
-
SHA1
bb2f974b3e0af2baa40920b475582bfd4fb28001
-
SHA256
89054e19532a9a62ca3403a8899495bf6f06557ff886b475a04227eb8aba7b12
-
SHA512
e9ec437a32301078ea69ce2f36dadab68315d5e56d94c4d579d3409ccbe0c9e00c3aed7baa0fa6d656fb8ed23213f4c01fb2d108c1a0ed11c58c76cd00f9a99d
Score1/10 -
-
-
Target
⠨/temp.bat
-
Size
204KB
-
MD5
72b17467a49b7813856fa604d1d291c8
-
SHA1
3116d07854d56f0bc505be8b80804a7319208739
-
SHA256
e24aaddfa2ece0891ad7b3c51779c65bbf95e4fded59fc46fe4fef311e1de3e1
-
SHA512
38c99cc716097ee7cb642203432ffbd1ef6ce8a0c9b21aa2827962b82456ecb3113fa1edd362aab013737e3bdfb2d0803145fc0caf612054ba47f6454c3a4843
-
SSDEEP
3072:YZ5q1dIOxM7uywhXemKY2GDM676x3P6qpsIRRpAdJ6PjzqqaTehW6+Goun9Oem1Z:e+PLjkf7VGrrPrmKCeFIzxzwhFfyGWzC
Score1/10 -