General
-
Target
90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0.exe
-
Size
983KB
-
Sample
240916-jlcn8awdpd
-
MD5
126fe36209cb4c46477e6d7aa4f3fe56
-
SHA1
69a1cef90f0e6739c9fd5ae2a984567327bea9f6
-
SHA256
90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0
-
SHA512
5ab26243cef267be9fc4ef5d4934b91714298ac018865d2494aa306cb5f0e85c04e2b5ee7c809410e82eca76616a707a3b70b274c81082ad961a0dfe0ef16515
-
SSDEEP
24576:0zZhzsd7E63T2FPay3SUP6nAK8T85vrQ+uXcMLumwjjZpyXWIWI:0ex6FPayCUPgX8azQ+uMMLuVjFO
Static task
static1
Behavioral task
behavioral1
Sample
90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
10.8
057d037117dc13a05f53caea44d69e65
https://steamcommunity.com/profiles/76561199761128941
https://t.me/iyigunl
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Targets
-
-
Target
90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0.exe
-
Size
983KB
-
MD5
126fe36209cb4c46477e6d7aa4f3fe56
-
SHA1
69a1cef90f0e6739c9fd5ae2a984567327bea9f6
-
SHA256
90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0
-
SHA512
5ab26243cef267be9fc4ef5d4934b91714298ac018865d2494aa306cb5f0e85c04e2b5ee7c809410e82eca76616a707a3b70b274c81082ad961a0dfe0ef16515
-
SSDEEP
24576:0zZhzsd7E63T2FPay3SUP6nAK8T85vrQ+uXcMLumwjjZpyXWIWI:0ex6FPayCUPgX8azQ+uMMLuVjFO
-
Detect Vidar Stealer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1