General

  • Target

    363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002.exe

  • Size

    4.6MB

  • MD5

    0c8b126be8f6262181ba66d64d009f07

  • SHA1

    80a6b4257741020361681f7fb6eccd1f5785f019

  • SHA256

    363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002

  • SHA512

    204e6c12d11a4528fa858bcef18f051148ed94b40a75306c754cc9a53ca281524793234ddb8e9a7ba755d7806f2c3b91764c8da14690ec8911b01d784aa4021e

  • SSDEEP

    98304:ky7BE7fKuQp/Ocm+XPiosjIsshGw/2gyrEvr1XNKLh:P7CWuHcmMuRgGO2g/raLh

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199677575543

https://t.me/snsb82

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 363739eb1038d36a7b76e79e31c92bbea5856f34131397798673664d9a868002.exe
    .exe windows:5 windows x86 arch:x86

    11919d1150a723ed324f77bedbc48581


    Headers

    Imports

    Sections