General

  • Target

    5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de.exe

  • Size

    188KB

  • MD5

    69f6607ad31228ce34dafae5f0affa19

  • SHA1

    085d67f3b2eb3039b61a87ed36454544bdcd33d3

  • SHA256

    5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de

  • SHA512

    9a09e07c1d626bd285d79ce9dbc8b25dd4f2b22e9f512909a67fa11cf5b2cb79ef742f97c1dc7d987158ac8464a819651817dea003688c8ee08c263b1f4b4baa

  • SSDEEP

    3072:oTflPf+8sptha5JuxyBhWZq9phbGN7Rqv3lfYtX:o5P2dzOJuxYQe4xYv1wtX

Malware Config

Extracted

Family

vidar

Version

8.4

Botnet

453a5f44680cb86f2de3dfd27c7e09cd

C2

https://steamcommunity.com/profiles/76561199654112719

https://t.me/r2d0s

Attributes
  • profile_id_v2

    453a5f44680cb86f2de3dfd27c7e09cd

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5f61c8c900a8de732fd3afad679b0fb2af83e57721587c9d7ccb44dd193835de.exe
    .exe windows:5 windows x86 arch:x86

    8178ed0c64de9ccabcaab8007468e585


    Headers

    Imports

    Sections