Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 20:33

General

  • Target

    3024-101-0x0000000000400000-0x0000000000676000-memory.exe

  • Size

    2.5MB

  • MD5

    abf76e2c021166e68a37a89b989cb32e

  • SHA1

    d53d0c98675a3b21c0218edc0b319c828577dfdd

  • SHA256

    8dfad05271f8f8fee275ee9be8ef6e1c51f20a23c47d162953a97f4ca3053c32

  • SHA512

    072373b327a8dbf45574ef78a4c514f771cc47cbf7e25c46f8affb9a6e486563d6311d805e73725e88767111c2d889dbcb14159597dae7160bd87595543e1188

  • SSDEEP

    6144:5lqPvKpKJNJGyRlyw8aSp0Vbux0R4kF/Y/o8+:5mRJNMalyLaO0Ix6BY/s

Malware Config

Extracted

Family

vidar

Version

11

Botnet

8b4d47586874b08947203f03e4db3962

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3024-101-0x0000000000400000-0x0000000000676000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3024-101-0x0000000000400000-0x0000000000676000-memory.exe"
    1⤵
      PID:1620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-0-0x0000000000400000-0x0000000000676000-memory.dmp

      Filesize

      2.5MB