General
-
Target
5f7bdc962aa76f272673ffb86ae8d634.bin
-
Size
282KB
-
Sample
240907-bqa27axemk
-
MD5
14f41d7ca8fec2d9758e204483ac46d9
-
SHA1
1fc89d5b40deb8a483e7044298e180a8f300652d
-
SHA256
5aea71f015eb65326576743db122e154df44e0abfb5c389f0478ef443058491b
-
SHA512
64c00ba527f3d7bf6cc7db005460381a911b5424e4617ce79102e4030bcec613edfa148edf03db2768841ff4e98397e9fecefa3fb2163d19a144de55ed1f377f
-
SSDEEP
6144:PrAEuY7QrOvwJLlxTYcDVAl3H9sOU3O+B77ISywdm+Vi:PrRV+OvwZ/TQl6OUZ7ISyd+Vi
Static task
static1
Behavioral task
behavioral1
Sample
9482245f504dc281027c12eed58c987147b2d982c3669e1c7dca3bc0911e7b97.exe
Resource
win7-20240708-en
Malware Config
Extracted
vidar
http://147.45.68.138:80
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
https://t.me/fneogr
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Extracted
lumma
https://stagedchheiqwo.shop/api
Targets
-
-
Target
9482245f504dc281027c12eed58c987147b2d982c3669e1c7dca3bc0911e7b97.exe
-
Size
294KB
-
MD5
5f7bdc962aa76f272673ffb86ae8d634
-
SHA1
0d78738b625c66f105c24484920a78ac02bd1533
-
SHA256
9482245f504dc281027c12eed58c987147b2d982c3669e1c7dca3bc0911e7b97
-
SHA512
62b6be5a24108c685a0824399dc78b33b5b52149d0e1b7792ac90a30d6fbd7bb2b0650563861e493c79f2313c33a2112f0bd9366e0947d24bee9b1206b4c0141
-
SSDEEP
6144:/IQ+sJCd1Tq+7ZMTEfLNGfG/7xcs8UyfYD+QKJ7JwGA358n47bDlcwIMHEO:wQ3yBqTEfxG4p8Uyu+97JwGGinaDBEO
-
Detect Vidar Stealer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4