General
-
Target
55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.zip
-
Size
227KB
-
Sample
240402-msmdsafe7v
-
MD5
16a56d01cc9f33cdac66c0abce8711a1
-
SHA1
10e18edcfe08c9bdafe5cbeb3320a3e3eab6305d
-
SHA256
bb88f7580c25b779360d2603e5cc6faedb86c19575773c9535a66fbc78318767
-
SHA512
d0c54bf086134165d693c270e223639238e3593a9b35e1612b4637e4efad7b99637da42fcc2cda931f19c3dd47d49ee957690e09df451062837d55f6731e7a96
-
SSDEEP
6144:cfdn9umXQ0OYBgjrCmOxUFaJS64h6NDdN:cfFZXyYSrCm1FNhgdN
Static task
static1
Behavioral task
behavioral1
Sample
55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
⠨/start.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
⠨/start.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
⠨/temp.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
⠨/temp.bat
Resource
win10v2004-20240226-en
Malware Config
Extracted
vidar
8.6
72f54d93118188013f2386eef7e5cc05
https://steamcommunity.com/profiles/76561199658817715
https://t.me/sa9ok
-
profile_id_v2
72f54d93118188013f2386eef7e5cc05
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
Targets
-
-
Target
55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77.exe
-
Size
271KB
-
MD5
8b8db4eaa6f5368eb5f64359c6197b43
-
SHA1
e9b51842e2d2f39fa06e466ae73af341ddffe1c8
-
SHA256
55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77
-
SHA512
4da734da30af148f246f433b71c72677b9f78698424db15eba364233dff183cb998f9be13d2832872829ac545be1e15ff75ceb85fca3fd0784265fd576db0056
-
SSDEEP
6144:xfL+oq+hnjsVl3dRQTLU+2bRRR17+fYHPfIMDPSBJ7Y/B4aSi3V:xfL5njsVlNuc++Rj17+fYHPfIg4Y54ap
Score10/10-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
-
-
Target
⠨/start.vbs
-
Size
231B
-
MD5
abe1dd23ab4c11aae54f1898c780c0b5
-
SHA1
bb2f974b3e0af2baa40920b475582bfd4fb28001
-
SHA256
89054e19532a9a62ca3403a8899495bf6f06557ff886b475a04227eb8aba7b12
-
SHA512
e9ec437a32301078ea69ce2f36dadab68315d5e56d94c4d579d3409ccbe0c9e00c3aed7baa0fa6d656fb8ed23213f4c01fb2d108c1a0ed11c58c76cd00f9a99d
Score1/10 -
-
-
Target
⠨/temp.bat
-
Size
204KB
-
MD5
72b17467a49b7813856fa604d1d291c8
-
SHA1
3116d07854d56f0bc505be8b80804a7319208739
-
SHA256
e24aaddfa2ece0891ad7b3c51779c65bbf95e4fded59fc46fe4fef311e1de3e1
-
SHA512
38c99cc716097ee7cb642203432ffbd1ef6ce8a0c9b21aa2827962b82456ecb3113fa1edd362aab013737e3bdfb2d0803145fc0caf612054ba47f6454c3a4843
-
SSDEEP
3072:YZ5q1dIOxM7uywhXemKY2GDM676x3P6qpsIRRpAdJ6PjzqqaTehW6+Goun9Oem1Z:e+PLjkf7VGrrPrmKCeFIzxzwhFfyGWzC
Score1/10 -