General
-
Target
Unlock_Tool_5.7.rar
-
Size
43.4MB
-
Sample
240914-s56k3s1fpn
-
MD5
031381e252de996606bdb17fa8b3fa08
-
SHA1
11fe18d38ff3ba3e56f583d027e65d7196de840a
-
SHA256
b33abedd054f481a526c376ebc61b8eea651f7604645d64df02d981d081f6300
-
SHA512
825a520b53661fc06f005ea8687d5cb6c63094d14072353b49d28687bfe3d58721e508c881608e4925bc8699603c723fff0b27b5a6ccbea195165bb9b71089e8
-
SSDEEP
786432:XiTim4ZkI3T1Ssy+rGfTGlSg7ZkbxmSyvnPTuO2+7p37y4tGbV/ZNT1Djn8X21:2iCGy+SfaXZ2dyXiqsOGbVBV1Dj6Q
Static task
static1
Behavioral task
behavioral1
Sample
Unlock_Tool_5.7.exe
Resource
win10v2004-20240802-es
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Targets
-
-
Target
Unlock_Tool_5.7.exe
-
Size
274KB
-
MD5
f1fc4857b145c3f406e101e7891e0806
-
SHA1
aaef6e23757b1a630e4d341b1c0789392e83813b
-
SHA256
0cda418e296bceda46e5a7b7f89a33acae4ff5c6523c22e82a75c4d26553db3b
-
SHA512
bd3d9f1b50f27dc2f1ee02756e0e04a3ee319e50697b4beafb7be47a6ebb5bc431ff7ddda9f710ab1c54bb5dcbeed90062995bc0eaf3fbaee0fb3a8ce475d744
-
SSDEEP
6144:H9BDl2wLHyWeemtO224BD0kc7P5W3w+KJsucPsmVqNvN+c:HjD4E7Jvqp0kc57/cPo
Score10/10-
Detect Vidar Stealer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4