General
-
Target
fb371a0bf9bd2437bfeb1e15335f35f60f071662c0c6a1d3b9abd1359ad85c93
-
Size
403KB
-
Sample
240926-3e8b4atcrn
-
MD5
477f0641023c28b462ea3d1b0a62151d
-
SHA1
d1e3eaa36f07796995c4ad192754bfebc20778dc
-
SHA256
fb371a0bf9bd2437bfeb1e15335f35f60f071662c0c6a1d3b9abd1359ad85c93
-
SHA512
08b6a37518fcc0f018375b33db4911da6f3111c9b3d9f621c15e584dc4823ec7ba613d01fb37793c4a8bea950c3b523a8ef092a73451c5e1cda35352e37c6dea
-
SSDEEP
12288:Dlu1SX7Sor999NBAlAdwefOixMORgj8cn7dy7zLsEO:o1SLzr1AlqdfrbuIOBygt
Static task
static1
Behavioral task
behavioral1
Sample
fb371a0bf9bd2437bfeb1e15335f35f60f071662c0c6a1d3b9abd1359ad85c93.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb371a0bf9bd2437bfeb1e15335f35f60f071662c0c6a1d3b9abd1359ad85c93.exe
Resource
win10-20240404-en
Malware Config
Extracted
vidar
11
58cd250b15e666e5f72fcf5caa6cb131
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
fb371a0bf9bd2437bfeb1e15335f35f60f071662c0c6a1d3b9abd1359ad85c93
-
Size
403KB
-
MD5
477f0641023c28b462ea3d1b0a62151d
-
SHA1
d1e3eaa36f07796995c4ad192754bfebc20778dc
-
SHA256
fb371a0bf9bd2437bfeb1e15335f35f60f071662c0c6a1d3b9abd1359ad85c93
-
SHA512
08b6a37518fcc0f018375b33db4911da6f3111c9b3d9f621c15e584dc4823ec7ba613d01fb37793c4a8bea950c3b523a8ef092a73451c5e1cda35352e37c6dea
-
SSDEEP
12288:Dlu1SX7Sor999NBAlAdwefOixMORgj8cn7dy7zLsEO:o1SLzr1AlqdfrbuIOBygt
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1