General
-
Target
011abc7752ab3180e8016d7f395a1a10.exe
-
Size
2.3MB
-
Sample
240705-qxbpmayhmr
-
MD5
011abc7752ab3180e8016d7f395a1a10
-
SHA1
c76164145c4a0debefa4a44cf9107e85d0428f32
-
SHA256
c58842bb0fdcff37f9ad04db475e9769a3a5449125d5044d518baea2640d2716
-
SHA512
037b0544cca532dbb0574d2ad189fc33ad794e67c2b71273f7a9c3973c5ac80aaaf2fbc4bf2cd30594b5d00f4062c2f99457c6ea4204a5dad54ec5dfda648ed3
-
SSDEEP
49152:x0ecwe0AWB48iGNnEtyX849TdByyfRhL3Au0EcoHUsdWwNs:oweu48iGStyXlRRhLwHsUsdWEs
Static task
static1
Behavioral task
behavioral1
Sample
011abc7752ab3180e8016d7f395a1a10.dll
Resource
win7-20240221-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
Targets
-
-
Target
011abc7752ab3180e8016d7f395a1a10.exe
-
Size
2.3MB
-
MD5
011abc7752ab3180e8016d7f395a1a10
-
SHA1
c76164145c4a0debefa4a44cf9107e85d0428f32
-
SHA256
c58842bb0fdcff37f9ad04db475e9769a3a5449125d5044d518baea2640d2716
-
SHA512
037b0544cca532dbb0574d2ad189fc33ad794e67c2b71273f7a9c3973c5ac80aaaf2fbc4bf2cd30594b5d00f4062c2f99457c6ea4204a5dad54ec5dfda648ed3
-
SSDEEP
49152:x0ecwe0AWB48iGNnEtyX849TdByyfRhL3Au0EcoHUsdWwNs:oweu48iGStyXlRRhLwHsUsdWEs
-
Detect Vidar Stealer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-