General
-
Target
file.exe
-
Size
868KB
-
Sample
240710-kczm3ayhqe
-
MD5
385f7a96f7f1d70235288031e0485f55
-
SHA1
64bbe059b28167cdc00ff7d4c9d4aeb1767cacd4
-
SHA256
be4b5edb41c224f0f4a7af5089f5def3857599c06f2ff47f307cd6238b9db852
-
SHA512
38dbf5bdef73c7d771c05b958a8725de3d0db8d211df274db27553fbcb85ac15e007a2bf52dfdadb5de250c78e40aeb2d80427f421ccd6ba0c2ebfaefed3e928
-
SSDEEP
24576:hwojq0vhlmRUMw1NGj1OB6RMRvrARHUDLG045:6P0ZcbUNGjlhtOP45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
Malware Config
Extracted
vidar
https://t.me/bu77un
https://steamcommunity.com/profiles/76561199730044335
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Targets
-
-
Target
file.exe
-
Size
868KB
-
MD5
385f7a96f7f1d70235288031e0485f55
-
SHA1
64bbe059b28167cdc00ff7d4c9d4aeb1767cacd4
-
SHA256
be4b5edb41c224f0f4a7af5089f5def3857599c06f2ff47f307cd6238b9db852
-
SHA512
38dbf5bdef73c7d771c05b958a8725de3d0db8d211df274db27553fbcb85ac15e007a2bf52dfdadb5de250c78e40aeb2d80427f421ccd6ba0c2ebfaefed3e928
-
SSDEEP
24576:hwojq0vhlmRUMw1NGj1OB6RMRvrARHUDLG045:6P0ZcbUNGjlhtOP45
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-