General
-
Target
https://google.com
-
Sample
240426-rhjmcsea2t
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win10v2004-20240426-en
windows10-2004-x64
20 signatures
1800 seconds
Malware Config
Extracted
Family
vidar
Botnet
e2fbe3ae2d0b282d162bb6c860980518
C2
https://hypaton.xyz
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
Attributes
-
profile_id_v2
e2fbe3ae2d0b282d162bb6c860980518
-
user_agent
Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6
Targets
-
-
Target
https://google.com
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Detect Vidar Stealer
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Suspicious use of SetThreadContext
-