General
-
Target
80d8b1bfdaf8085595c83d95e1b50a4a.bin
-
Size
276KB
-
Sample
240913-bveaeawgpj
-
MD5
ebd9565b8d51d06123ed03cdf89afbd9
-
SHA1
64f718b789f55cc34096608f5802fc97b491abc7
-
SHA256
ceec7d50dd1724ef64f33feeaef22fe46a0e5d669af25c4079b512ca182c55d3
-
SHA512
5ca860cdb43c2af5a5e158de4e85c3b86cf6a924a40bbe547bd89aead2c8b5229af0158b7f13d2f43c09055d9877696a4a45af0d063184b80bac2188771912f6
-
SSDEEP
6144:D6uuLmPORtYgD6v2LpDxtlkUWU9zn1vs/Hip72TKBvJb6Y:DDuCPOPxvtmUWo1vbYTKBh5
Static task
static1
Behavioral task
behavioral1
Sample
67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe
Resource
win7-20240708-en
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Targets
-
-
Target
67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe
-
Size
282KB
-
MD5
80d8b1bfdaf8085595c83d95e1b50a4a
-
SHA1
c4a9c9765d296159c0b882ee952418f4208a8f6b
-
SHA256
67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e
-
SHA512
e124f0303de3e4bc9519ec6d9c0fbb19bacafd4bc52aeb7ae04e0c2cf3db845a9e3d8504223da7f910453b58041913b8165aa5ebdd87e73499cbcf27e897ecbe
-
SSDEEP
6144:KCjGhD5daDWqd+wQG5u1x5miq6gXGG07ejs0uK0HuEO:1IDH7wQkuD5GRGG0KA0uKUuEO
-
Detect Vidar Stealer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4