General
-
Target
S0FTWARE.rar
-
Size
21.4MB
-
Sample
240930-nchw4asbnm
-
MD5
9e836a69e0bbdc74c826da13227f78b7
-
SHA1
ae7b5cba4cf8bd0baf276785d073fbc4cc84b1df
-
SHA256
4aaa1052ec1148f52506afe6087c885b979b2b4923df82b142eb007d160656d5
-
SHA512
10997f3544277d4e3db862fbef2e1a373ef0b700b53eef8de26452cf9facc60afbb12ade59c2783a7a1ca7d6cba5e4eceb46f58cad909f3c4f38168a61e6a886
-
SSDEEP
393216:1RFfxJKFA4VNEMPa/TacMM8McH3YYCKoEt2WW8VqQhqfyDCQ8ppqb76U/q:DFfaVNyaXM8MKCK5z3Vqqqq+T+Nq
Static task
static1
Behavioral task
behavioral1
Sample
S0FTWARE.rar
Resource
win10-20240404-en
Malware Config
Extracted
vidar
11
346a77fbabba142b23c256004b5a7c5d
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
S0FTWARE.rar
-
Size
21.4MB
-
MD5
9e836a69e0bbdc74c826da13227f78b7
-
SHA1
ae7b5cba4cf8bd0baf276785d073fbc4cc84b1df
-
SHA256
4aaa1052ec1148f52506afe6087c885b979b2b4923df82b142eb007d160656d5
-
SHA512
10997f3544277d4e3db862fbef2e1a373ef0b700b53eef8de26452cf9facc60afbb12ade59c2783a7a1ca7d6cba5e4eceb46f58cad909f3c4f38168a61e6a886
-
SSDEEP
393216:1RFfxJKFA4VNEMPa/TacMM8McH3YYCKoEt2WW8VqQhqfyDCQ8ppqb76U/q:DFfaVNyaXM8MKCK5z3Vqqqq+T+Nq
-
Detect Vidar Stealer
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1