General

  • Target

    97dd6eec48070e00ed5de9e658713cec02f89df5c316a65b1cbe1d3dc1c21974.exe

  • Size

    405KB

  • Sample

    240429-bw8kmsec65

  • MD5

    f0aa32f560c251d14660328d20bf44b0

  • SHA1

    14b81d794c3d169047971b3cac2860623da3b885

  • SHA256

    97dd6eec48070e00ed5de9e658713cec02f89df5c316a65b1cbe1d3dc1c21974

  • SHA512

    4fc2887e2025464bb27085ae4dd533dc5ccbdc875cf663d1e8673be000848cefd01d31ecaf8bf76aaadea80c2d60690c67bd77636a8b46dbe82471c442e0bb01

  • SSDEEP

    12288:8dKw6fqftA4Z2QYyh1FPkm6N1epfj0sLV0mfyasNSE:eKvqf4QYS1F8NQfbLOayaQl

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199677575543

https://t.me/snsb82

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Targets

    • Target

      97dd6eec48070e00ed5de9e658713cec02f89df5c316a65b1cbe1d3dc1c21974.exe

    • Size

      405KB

    • MD5

      f0aa32f560c251d14660328d20bf44b0

    • SHA1

      14b81d794c3d169047971b3cac2860623da3b885

    • SHA256

      97dd6eec48070e00ed5de9e658713cec02f89df5c316a65b1cbe1d3dc1c21974

    • SHA512

      4fc2887e2025464bb27085ae4dd533dc5ccbdc875cf663d1e8673be000848cefd01d31ecaf8bf76aaadea80c2d60690c67bd77636a8b46dbe82471c442e0bb01

    • SSDEEP

      12288:8dKw6fqftA4Z2QYyh1FPkm6N1epfj0sLV0mfyasNSE:eKvqf4QYS1F8NQfbLOayaQl

    Score
    10/10
    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks