Behavioral task
behavioral1
Sample
363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002.exe
Resource
win7-20240215-en
General
-
Target
363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002.exe
-
Size
4.6MB
-
MD5
0c8b126be8f6262181ba66d64d009f07
-
SHA1
80a6b4257741020361681f7fb6eccd1f5785f019
-
SHA256
363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002
-
SHA512
204e6c12d11a4528fa858bcef18f051148ed94b40a75306c754cc9a53ca281524793234ddb8e9a7ba755d7806f2c3b91764c8da14690ec8911b01d784aa4021e
-
SSDEEP
98304:ky7BE7fKuQp/Ocm+XPiosjIsshGw/2gyrEvr1XNKLh:P7CWuHcmMuRgGO2g/raLh
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Detect Vidar Stealer 1 IoCs
resource yara_rule sample family_vidar_v7 -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002.exe
Files
-
363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002.exe.exe windows:5 windows x86 arch:x86
11919d1150a723ed324f77bedbc48581
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strlen
kernel32
IsProcessorFeaturePresent
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CharToOemA
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
advapi32
RegOpenKeyExA
shell32
SHFileOperationA
ole32
CoInitializeSecurity
oleaut32
VariantInit
shlwapi
ord155
wtsapi32
WTSSendMessageW
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp_(-) Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp_(-) Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ