Behavioral task
behavioral1
Sample
177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01.exe
Resource
win7-20240704-en
General
-
Target
7debc473f9ec83c3d000a57466eab9b2.bin
-
Size
95KB
-
MD5
7c6e85f1e38b1ec50d405df0156239d1
-
SHA1
b3ede46c28872b57f5ae2d8c5c1aaec97e6478fd
-
SHA256
6b7f8069ebfedb0c90f87181afb33e254c09f8188c7293c7012d24a7337ff148
-
SHA512
61e044cea8220cfe3a349ed4e4d9e1e9bf0c4a1d1232fc96a6080f4d36382cee2e55f3f136365c8ba5e111ac2bef6918e37f173d2e2fdb43d60e7d50247699f9
-
SSDEEP
1536:0OgWmjl8SqJ8fg8AwAj9n5rCQac63VjzrneBWGkdLVSJRqGEEvTrw5x8+:07WRSA8g8Awo5rmPjnneBW/hV+v0x8+
Malware Config
Extracted
vidar
https://t.me/bu77un
https://steamcommunity.com/profiles/76561199730044335
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Signatures
-
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule static1/unpack001/177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01.exe family_vidar_v7 -
Stealc family
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01.exe
Files
-
7debc473f9ec83c3d000a57466eab9b2.bin.zip
Password: infected
-
177522949060fb57da49ff445edd38f2fef86c30d86603b3438b874635fbde01.exe.exe windows:5 windows x86 arch:x86
Password: infected
14b0ac3afcc0fd8a741f8eb3917d4d03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcslen
memcmp
strlen
??_U@YAPAXI@Z
srand
rand
strncpy
malloc
_wtoi64
atexit
memchr
??_V@YAXPAX@Z
__CxxFrameHandler3
memmove
strtok_s
strchr
strcpy_s
memcpy
memset
kernel32
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
ExitProcess
GetCurrentProcess
LocalAlloc
lstrlenA
HeapFree
ReadProcessMemory
VirtualQueryEx
OpenProcess
HeapAlloc
GetProcessHeap
GetStringTypeW
FileTimeToSystemTime
CloseHandle
CreateProcessA
GetDriveTypeA
GetLogicalDriveStringsA
WaitForSingleObject
CreateThread
CreateDirectoryA
GetProcAddress
LoadLibraryA
lstrlenW
ReadFile
SetFilePointer
GetFileSize
GetFileInformationByHandle
MapViewOfFile
CreateFileMappingA
CreateFileA
WriteFile
SystemTimeToFileTime
GetLocalTime
GetTickCount
lstrcatA
lstrcpyA
GetCPInfo
GetComputerNameA
LoadLibraryW
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsSetValue
TlsGetValue
GetModuleFileNameW
RaiseException
GetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
GetModuleHandleW
Sleep
GetStdHandle
user32
CharToOemA
GetDesktopWindow
wsprintfW
advapi32
GetUserNameA
RegOpenKeyExA
RegGetValueA
GetCurrentHwProfileA
shell32
SHFileOperationA
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
shlwapi
ord155
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ