General
-
Target
84cf6bb876853f4b8bfe9d3b27baf91bb04dd29031d1724b78337a28985c676d.exe
-
Size
394KB
-
Sample
240924-bym2qaward
-
MD5
64bb15a561342db08d8362ab5b83f37f
-
SHA1
9fcd468bc8ebcc5dd1bf98329824bb5fc8c2b255
-
SHA256
84cf6bb876853f4b8bfe9d3b27baf91bb04dd29031d1724b78337a28985c676d
-
SHA512
4e558b7e8353458adc6066ec8a363ce82810483185b40a7e5a64aedc29aff71b8362e68c54e679c2a63a76bdeb400d5f8f6ef6ce91646589c08d52c4ee9e3a53
-
SSDEEP
12288:hLHiRiF5lT7ODeIbuH5+zte+NyLt/8DERu:hLHiReODeIbuH5gtbNyiE
Static task
static1
Behavioral task
behavioral1
Sample
84cf6bb876853f4b8bfe9d3b27baf91bb04dd29031d1724b78337a28985c676d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84cf6bb876853f4b8bfe9d3b27baf91bb04dd29031d1724b78337a28985c676d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
11
58cd250b15e666e5f72fcf5caa6cb131
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
84cf6bb876853f4b8bfe9d3b27baf91bb04dd29031d1724b78337a28985c676d.exe
-
Size
394KB
-
MD5
64bb15a561342db08d8362ab5b83f37f
-
SHA1
9fcd468bc8ebcc5dd1bf98329824bb5fc8c2b255
-
SHA256
84cf6bb876853f4b8bfe9d3b27baf91bb04dd29031d1724b78337a28985c676d
-
SHA512
4e558b7e8353458adc6066ec8a363ce82810483185b40a7e5a64aedc29aff71b8362e68c54e679c2a63a76bdeb400d5f8f6ef6ce91646589c08d52c4ee9e3a53
-
SSDEEP
12288:hLHiRiF5lT7ODeIbuH5+zte+NyLt/8DERu:hLHiReODeIbuH5gtbNyiE
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4