General
-
Target
657667f4b9ea378ee83ee6aa691bdfb71b3dbf0a320eafbec50b7d1324982aba
-
Size
10.9MB
-
Sample
240825-qpmf6ayamr
-
MD5
a154607fdb9dc1990f91e19b7a983b5e
-
SHA1
484ea434fa901ae31fc55ab49769532a7933f085
-
SHA256
657667f4b9ea378ee83ee6aa691bdfb71b3dbf0a320eafbec50b7d1324982aba
-
SHA512
02fa25e3df0a77e1b005e3c235a4927863b1d83fd16c64c9aed29c6c72d298a4162056a4133457b4a1a5c17f33a1a133808dfed509f63abf0b3364797f2bb0c4
-
SSDEEP
196608:MIKLimvkgOM4eZUSNir72C3SA3iXIHSUmhi8oqvoecSA6sH0ebyF6maT:npiA3i4l8tvsS1OC6FT
Static task
static1
Behavioral task
behavioral1
Sample
657667f4b9ea378ee83ee6aa691bdfb71b3dbf0a320eafbec50b7d1324982aba.exe
Resource
win7-20240708-en
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199751190313
https://t.me/pech0nk
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Extracted
lumma
https://caffegclasiqwp.shop/api
https://locatedblsoqp.shop/api
https://traineiwnqo.shop/api
https://condedqpwqm.shop/api
https://millyscroqwp.shop/api
https://stagedchheiqwo.shop/api
https://stamppreewntnq.shop/api
https://tenntysjuxmz.shop/api
Targets
-
-
Target
657667f4b9ea378ee83ee6aa691bdfb71b3dbf0a320eafbec50b7d1324982aba
-
Size
10.9MB
-
MD5
a154607fdb9dc1990f91e19b7a983b5e
-
SHA1
484ea434fa901ae31fc55ab49769532a7933f085
-
SHA256
657667f4b9ea378ee83ee6aa691bdfb71b3dbf0a320eafbec50b7d1324982aba
-
SHA512
02fa25e3df0a77e1b005e3c235a4927863b1d83fd16c64c9aed29c6c72d298a4162056a4133457b4a1a5c17f33a1a133808dfed509f63abf0b3364797f2bb0c4
-
SSDEEP
196608:MIKLimvkgOM4eZUSNir72C3SA3iXIHSUmhi8oqvoecSA6sH0ebyF6maT:npiA3i4l8tvsS1OC6FT
-
Detect Vidar Stealer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4