General
-
Target
f4cd4350d5e48264696b980cc329ed0c1809b14194894557672cbb4baec3feea
-
Size
403KB
-
Sample
240926-3ewcjawepg
-
MD5
55a5f2beec3dd4e2e81bd8c88b231ede
-
SHA1
ca181991974c87da13066a00750f01dc175ee258
-
SHA256
f4cd4350d5e48264696b980cc329ed0c1809b14194894557672cbb4baec3feea
-
SHA512
03171620055fe45e71e20c4e19f9612d918254b66f652b61d45c6be936d0e5e6aff75a31481ffd0350d41f803feb0177c1a5c78086cfb18564112c7341faaafb
-
SSDEEP
12288:sqo8/oWTZ9KhJIkbG/BkxvGqbS/+q9Z3qI2uEO:ig19K7Ikkk9xbctZ3q4t
Static task
static1
Behavioral task
behavioral1
Sample
f4cd4350d5e48264696b980cc329ed0c1809b14194894557672cbb4baec3feea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4cd4350d5e48264696b980cc329ed0c1809b14194894557672cbb4baec3feea.exe
Resource
win10-20240404-en
Malware Config
Extracted
vidar
11
9bf5e431869643a2ac397d2dc0d687fb
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
f4cd4350d5e48264696b980cc329ed0c1809b14194894557672cbb4baec3feea
-
Size
403KB
-
MD5
55a5f2beec3dd4e2e81bd8c88b231ede
-
SHA1
ca181991974c87da13066a00750f01dc175ee258
-
SHA256
f4cd4350d5e48264696b980cc329ed0c1809b14194894557672cbb4baec3feea
-
SHA512
03171620055fe45e71e20c4e19f9612d918254b66f652b61d45c6be936d0e5e6aff75a31481ffd0350d41f803feb0177c1a5c78086cfb18564112c7341faaafb
-
SSDEEP
12288:sqo8/oWTZ9KhJIkbG/BkxvGqbS/+q9Z3qI2uEO:ig19K7Ikkk9xbctZ3q4t
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1