General
-
Target
S0FTWARE.zip
-
Size
152.1MB
-
Sample
241020-xggdhathje
-
MD5
c4e6c468339dec6f0a3129bb418de4e8
-
SHA1
da45658d7c47c66e825436896cb157294d9c0419
-
SHA256
d213b75523db2e3678178d0cb992aa0a1a6e0b7378578e638160b9bf30d23815
-
SHA512
d4a0e2361b879095033d5345b167b134da868ad6cffc7c447cad2844e9d42f7c212d0f1a79dcb523870ef24c20f4c5c39873203319ac7f02d8d498bdbb36653d
-
SSDEEP
3145728:m1cZZPJb63kzIvNI9Wt2ij4Hv8j9oe2APzKqMbplU0weB/FoEIEQOjYDLxJJ:kAZPJbIkzIVIjij4HeorAPzdMvUd6h3k
Static task
static1
Behavioral task
behavioral1
Sample
S0FTWARE.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
S0FTWARE.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
S0FTWARE_(password_1234).zip
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
S0FTWARE_(password_1234).zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.1
467d1313a0fbcd97b65a6f1d261c288f
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
S0FTWARE.zip
-
Size
152.1MB
-
MD5
c4e6c468339dec6f0a3129bb418de4e8
-
SHA1
da45658d7c47c66e825436896cb157294d9c0419
-
SHA256
d213b75523db2e3678178d0cb992aa0a1a6e0b7378578e638160b9bf30d23815
-
SHA512
d4a0e2361b879095033d5345b167b134da868ad6cffc7c447cad2844e9d42f7c212d0f1a79dcb523870ef24c20f4c5c39873203319ac7f02d8d498bdbb36653d
-
SSDEEP
3145728:m1cZZPJb63kzIvNI9Wt2ij4Hv8j9oe2APzKqMbplU0weB/FoEIEQOjYDLxJJ:kAZPJbIkzIVIjij4HeorAPzdMvUd6h3k
-
Detect Vidar Stealer
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
S0FTWARE_(password_1234).zip
-
Size
152.1MB
-
MD5
9b5fa5c55c90343d37c37f6146351bbb
-
SHA1
e3e58468022671236cae687902194efc68bb79f3
-
SHA256
17c653e206918c482ecb2c2cce6261d8b92f3f9d5c926f8daef4f25451ff8207
-
SHA512
c4e7f43fb8479de467eacebe7f3784293b22faa0faedf106341464dfe9f41bdc31fdfc784f4e3ee66bf06f543a47369977e31d20a14e729863e74448d121dee7
-
SSDEEP
3145728:KMSxp7GQQRIhWBxKJSf6yjcH1Cl9eU4MP/uKIdR3wG+ULX5A66uqsjNmvjdPb:5wp7GQ6IhWfKdyjcHEe/MP/vIHwZYpda
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Defense Evasion
Impair Defenses
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4