General
-
Target
09c9a7766eae2fe2b29a4bed104cbfd2e37f275af139af2e38c2538b772528f0
-
Size
8.0MB
-
Sample
241017-w3gqqaydlg
-
MD5
6e4bc15f250301e24b3430ad6f4d057c
-
SHA1
2c3d85cd955c3610b50b7402a0fcb39372792d6b
-
SHA256
09c9a7766eae2fe2b29a4bed104cbfd2e37f275af139af2e38c2538b772528f0
-
SHA512
d227de72ecab5e0fefbdabe259a05d72df09fc3b1a58296120c29c03cbadb333159500d051611af2b4110b7d55d2bd044c559eb1bd90683a3df89437df47c22f
-
SSDEEP
196608:Go7RLyPaLtaoJai5RgtqHx7JYk12vp7aqUGxbKgA8:T71DEo35RgtqHRk7G2KX8
Static task
static1
Behavioral task
behavioral1
Sample
09c9a7766eae2fe2b29a4bed104cbfd2e37f275af139af2e38c2538b772528f0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09c9a7766eae2fe2b29a4bed104cbfd2e37f275af139af2e38c2538b772528f0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
10.8
be248f550d2c12b9451f666b78745d64
https://steamcommunity.com/profiles/76561199761128941
https://t.me/iyigunl
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Targets
-
-
Target
09c9a7766eae2fe2b29a4bed104cbfd2e37f275af139af2e38c2538b772528f0
-
Size
8.0MB
-
MD5
6e4bc15f250301e24b3430ad6f4d057c
-
SHA1
2c3d85cd955c3610b50b7402a0fcb39372792d6b
-
SHA256
09c9a7766eae2fe2b29a4bed104cbfd2e37f275af139af2e38c2538b772528f0
-
SHA512
d227de72ecab5e0fefbdabe259a05d72df09fc3b1a58296120c29c03cbadb333159500d051611af2b4110b7d55d2bd044c559eb1bd90683a3df89437df47c22f
-
SSDEEP
196608:Go7RLyPaLtaoJai5RgtqHx7JYk12vp7aqUGxbKgA8:T71DEo35RgtqHRk7G2KX8
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-