General
-
Target
gig
-
Size
334KB
-
Sample
240915-2w2efawgng
-
MD5
08ebe434574dbea9702086949683521e
-
SHA1
38618aeb70a9305fddcf762ba59dfdd41bd09389
-
SHA256
2893a6535330caac711d3f2d21538cd7107200cf422eec26eb982c1bd0425f39
-
SHA512
a99268254a0e90323b25563819bd9f6e65508f8dd574a309608163cc5650aee7a31da8f68de6f20c2da4451f6b62e415de8ab34ae089e78ef222408bc1e65566
-
SSDEEP
6144:0VYIbMos9I7CVYIbMos9I7YKFM98QFUoEO3zE8L29VYIbMos9I7uVYIbMos9I7:0VYIoos9I7CVYIoos9I7ZVYIoos9I7ud
Static task
static1
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Targets
-
-
Target
gig
-
Size
334KB
-
MD5
08ebe434574dbea9702086949683521e
-
SHA1
38618aeb70a9305fddcf762ba59dfdd41bd09389
-
SHA256
2893a6535330caac711d3f2d21538cd7107200cf422eec26eb982c1bd0425f39
-
SHA512
a99268254a0e90323b25563819bd9f6e65508f8dd574a309608163cc5650aee7a31da8f68de6f20c2da4451f6b62e415de8ab34ae089e78ef222408bc1e65566
-
SSDEEP
6144:0VYIbMos9I7CVYIbMos9I7YKFM98QFUoEO3zE8L29VYIbMos9I7uVYIbMos9I7:0VYIoos9I7CVYIoos9I7ZVYIoos9I7ud
-
Detect Vidar Stealer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2