Overview
overview
10Static
static
3AmsterdamC...TD.exe
windows10-1703-x64
10Lib/distut...64.exe
windows10-1703-x64
1Lib/distut....0.exe
windows10-1703-x64
1Lib/distut...64.exe
windows10-1703-x64
1Lib/distut....0.exe
windows10-1703-x64
1Lib/distut....0.exe
windows10-1703-x64
1Lib/distut....1.exe
windows10-1703-x64
1Lib/distut....0.exe
windows10-1703-x64
1Lib/distut...64.exe
windows10-1703-x64
1Lib/distut....0.exe
windows10-1703-x64
1Lib/email/charset.py
windows10-1703-x64
3pythonw.exe
windows10-1703-x64
1setup.bat
windows10-1703-x64
10Analysis
-
max time kernel
126s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29/05/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
AmsterdamCryptoLTD.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Lib/distutils/command/wininst-10.0-amd64.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Lib/distutils/command/wininst-10.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Lib/distutils/command/wininst-14.0-amd64.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Lib/distutils/command/wininst-14.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Lib/distutils/command/wininst-6.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Lib/distutils/command/wininst-7.1.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
Lib/distutils/command/wininst-8.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
Lib/distutils/command/wininst-9.0-amd64.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
Lib/distutils/command/wininst-9.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
Lib/email/charset.py
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
pythonw.exe
Resource
win10-20240404-en
General
-
Target
setup.bat
-
Size
119B
-
MD5
01c6147fe212bd1a211b47885bd51574
-
SHA1
8e2eb02209e29734eda19a589a3586fdcae2869b
-
SHA256
762807919a78fcd34ab1be1d88eceb93248b567aa294eecdd9ed0a80e865977c
-
SHA512
abab3abb01487b50a329e12668898ef29d921c35357cf9b2fce4dd9039df126d7c74c828582f35e19fdfd8ddcbeca76925eaa9b7823005b8743ce233b6b1e9cf
Malware Config
Extracted
Protocol: ftp- Host:
193.149.189.199 - Port:
21 - Username:
ins - Password:
installer
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Signatures
-
Detect Vidar Stealer 10 IoCs
resource yara_rule behavioral13/memory/228-89-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-91-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-92-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-98-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-99-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-116-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-117-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-129-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-130-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral13/memory/228-131-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3764 set thread context of 228 3764 pythonw.exe 74 -
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString pythonw.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2292 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 228 pythonw.exe 228 pythonw.exe 228 pythonw.exe 228 pythonw.exe 228 pythonw.exe 228 pythonw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 3764 pythonw.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3764 3068 cmd.exe 73 PID 3068 wrote to memory of 3764 3068 cmd.exe 73 PID 3068 wrote to memory of 3764 3068 cmd.exe 73 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 3764 wrote to memory of 228 3764 pythonw.exe 74 PID 228 wrote to memory of 4172 228 pythonw.exe 76 PID 228 wrote to memory of 4172 228 pythonw.exe 76 PID 228 wrote to memory of 4172 228 pythonw.exe 76 PID 4172 wrote to memory of 2292 4172 cmd.exe 78 PID 4172 wrote to memory of 2292 4172 cmd.exe 78 PID 4172 wrote to memory of 2292 4172 cmd.exe 78
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\setup.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\pythonw.exepythonw.exe server.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\pythonw.exe"pythonw.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HDAFIIDAKJDG" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:2292
-
-
-
-