Behavioral task
behavioral1
Sample
5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de.exe
Resource
win10v2004-20240226-en
General
-
Target
5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de.exe
-
Size
188KB
-
MD5
69f6607ad31228ce34dafae5f0affa19
-
SHA1
085d67f3b2eb3039b61a87ed36454544bdcd33d3
-
SHA256
5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de
-
SHA512
9a09e07c1d626bd285d79ce9dbc8b25dd4f2b22e9f512909a67fa11cf5b2cb79ef742f97c1dc7d987158ac8464a819651817dea003688c8ee08c263b1f4b4baa
-
SSDEEP
3072:oTflPf+8sptha5JuxyBhWZq9phbGN7Rqv3lfYtX:o5P2dzOJuxYQe4xYv1wtX
Malware Config
Extracted
vidar
8.4
453a5f44680cb86f2de3dfd27c7e09cd
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
-
profile_id_v2
453a5f44680cb86f2de3dfd27c7e09cd
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Signatures
-
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule sample family_vidar_v7 -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de.exe
Files
-
5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de.exe.exe windows:5 windows x86 arch:x86
8178ed0c64de9ccabcaab8007468e585
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_EH_prolog
??_U@YAPAXI@Z
memcmp
__CxxFrameHandler3
strncpy
malloc
_wtoi64
atexit
??_V@YAXPAX@Z
memmove
memchr
strlen
strtok_s
strcpy_s
strchr
memcpy
memset
kernel32
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
ExitProcess
GetCurrentProcess
lstrlenA
lstrcatA
LocalAlloc
ReadProcessMemory
VirtualQueryEx
OpenProcess
FileTimeToSystemTime
CloseHandle
WaitForSingleObject
CreateThread
GetDriveTypeA
GetLogicalDriveStringsA
GetProcAddress
LoadLibraryA
HeapAlloc
VirtualAllocExNuma
HeapFree
LoadLibraryW
GetStringTypeW
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
GetModuleFileNameW
GetStdHandle
WriteFile
Sleep
RaiseException
EncodePointer
GetLastError
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsSetValue
GetModuleHandleW
SetLastError
GetCurrentThreadId
user32
CharToOemA
advapi32
RegOpenKeyExA
RegGetValueA
GetCurrentHwProfileA
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
ord155
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ