General
-
Target
file.exe
-
Size
282KB
-
Sample
240913-l7c8zsxdnr
-
MD5
a34d7daa11a8fec34b5d435f2915b4e3
-
SHA1
4eb5f71cbe7f5c4a0cf45a024a73e722b559833b
-
SHA256
b10d3a615a6fb0971d10d6e853977f6c4b80a2085732e8273b363c2efa21aa9f
-
SHA512
048edabc8433df162e3590a210b1bbae97db0d3dd0f77ed55d74292e7f72e142462919412dfb8e849ae0fc48170795ba15c2cde99ee4709308e434ef2f370701
-
SSDEEP
6144:LnP22RU3G8V6uctgRgnllTLaHh95tjdB/sZe5rompXUDEO:jP25WLvtnllfaB9XxIe5rocXEEO
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Targets
-
-
Target
file.exe
-
Size
282KB
-
MD5
a34d7daa11a8fec34b5d435f2915b4e3
-
SHA1
4eb5f71cbe7f5c4a0cf45a024a73e722b559833b
-
SHA256
b10d3a615a6fb0971d10d6e853977f6c4b80a2085732e8273b363c2efa21aa9f
-
SHA512
048edabc8433df162e3590a210b1bbae97db0d3dd0f77ed55d74292e7f72e142462919412dfb8e849ae0fc48170795ba15c2cde99ee4709308e434ef2f370701
-
SSDEEP
6144:LnP22RU3G8V6uctgRgnllTLaHh95tjdB/sZe5rompXUDEO:jP25WLvtnllfaB9XxIe5rocXEEO
Score10/10-
Detect Vidar Stealer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1