General
-
Target
2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581.exe
-
Size
5.4MB
-
Sample
240929-bg7d2atepr
-
MD5
8d556f35d2768d27b334d0e76d4d3295
-
SHA1
33f2fbfe5c2b3d3d470bbf28c20e15283e20717c
-
SHA256
2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581
-
SHA512
eadec8014bc15d1f72c44e5a45a2546a450d3c529aecc21d850ea50ebda1b5d47d569b4c6aef4215c402db87efbac7550736d28bc101d920f900ea80f83bc4ea
-
SSDEEP
98304:Eg2nmyTusqokbqW3alL1eMT8dq+5L34fs6DvS/GhE5ZyxDmwXQsZRqKoGgLNxeId:bryTusqok2kgeMIY+5L34f2MCkmwXdRk
Static task
static1
Behavioral task
behavioral1
Sample
2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
11
ffa0fc7713f6625bf874f947bcf3df53
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
https://reinforcenh.shop/api
https://stogeneratmns.shop/api
https://fragnantbui.shop/api
https://drawzhotdog.shop/api
https://vozmeatillu.shop/api
https://offensivedzvju.shop/api
https://ghostreedmnu.shop/api
https://gutterydhowi.shop/api
Extracted
vidar
11
c8450254a9a0920212cb81ae7f386da3
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581.exe
-
Size
5.4MB
-
MD5
8d556f35d2768d27b334d0e76d4d3295
-
SHA1
33f2fbfe5c2b3d3d470bbf28c20e15283e20717c
-
SHA256
2bdab82a67299ff24cca7e0884c17fab80f45b364ba718142c80bdfbd573b581
-
SHA512
eadec8014bc15d1f72c44e5a45a2546a450d3c529aecc21d850ea50ebda1b5d47d569b4c6aef4215c402db87efbac7550736d28bc101d920f900ea80f83bc4ea
-
SSDEEP
98304:Eg2nmyTusqokbqW3alL1eMT8dq+5L34fs6DvS/GhE5ZyxDmwXQsZRqKoGgLNxeId:bryTusqok2kgeMIY+5L34f2MCkmwXdRk
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4