General

  • Target

    e49fbe983f9657085fd6ed87ef01d3d80b8c89fc15e159e227e661c8a9f76704.exe

  • Size

    393KB

  • Sample

    240428-clv28sec6v

  • MD5

    b96f9d010e1c6150e78bd217212f2854

  • SHA1

    c43a35a08db7358281d25a2f0134d41eb37a3ae8

  • SHA256

    e49fbe983f9657085fd6ed87ef01d3d80b8c89fc15e159e227e661c8a9f76704

  • SHA512

    956b90536bb9fa138854a1e47313219b117485708a20e110946682eff972a8e0ee396041b13b1cc03f103989f3029cf59e55ea0b17940ffd8be50dd3f4f2252d

  • SSDEEP

    6144:nGVRPs+yOtDqvFTbTEw3A9YkXw44ExQF9K6H6E+gyVMjM20vK2Bss5YjP:8RPs+yOo2h9YExQW6HziMw2DGss2jP

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199677575543

https://t.me/snsb82

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Targets

    • Target

      e49fbe983f9657085fd6ed87ef01d3d80b8c89fc15e159e227e661c8a9f76704.exe

    • Size

      393KB

    • MD5

      b96f9d010e1c6150e78bd217212f2854

    • SHA1

      c43a35a08db7358281d25a2f0134d41eb37a3ae8

    • SHA256

      e49fbe983f9657085fd6ed87ef01d3d80b8c89fc15e159e227e661c8a9f76704

    • SHA512

      956b90536bb9fa138854a1e47313219b117485708a20e110946682eff972a8e0ee396041b13b1cc03f103989f3029cf59e55ea0b17940ffd8be50dd3f4f2252d

    • SSDEEP

      6144:nGVRPs+yOtDqvFTbTEw3A9YkXw44ExQF9K6H6E+gyVMjM20vK2Bss5YjP:8RPs+yOo2h9YExQW6HziMw2DGss2jP

    Score
    10/10
    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks