General
-
Target
2024-10-21_6733924c670207ed7755dc0fe2286c36_icedid_rhadamanthys
-
Size
5.0MB
-
Sample
241021-2z33fa1hkg
-
MD5
6733924c670207ed7755dc0fe2286c36
-
SHA1
2fea9c1b0c3b0a923232dbcadcfc661bb08031d0
-
SHA256
a555018ed03a0b191f64f625b75cebd9f62c194c7b1c1a66b91266f2f1c1b6c4
-
SHA512
692d642223ddcff9e75e0d76437fbc760f9a356609fc4c3cccdddbdeb453f2bf04ce8438c3820b4445c320840a28f86215da880f1d8fe96dc9f65567e4505e67
-
SSDEEP
98304:6o4H5BopFuyJBk7f2lMmojnMH1u/FRrxrjUJMJCG:6oQ5Ba3k7LMH1u/rrxrjUJ0
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-21_6733924c670207ed7755dc0fe2286c36_icedid_rhadamanthys.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-21_6733924c670207ed7755dc0fe2286c36_icedid_rhadamanthys.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.1
65158feadb3cebfa5c9a9e36f0d461fe
https://t.me/fun88rockskek
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
profile_id_v2
Option -%c requires an argument.
Targets
-
-
Target
2024-10-21_6733924c670207ed7755dc0fe2286c36_icedid_rhadamanthys
-
Size
5.0MB
-
MD5
6733924c670207ed7755dc0fe2286c36
-
SHA1
2fea9c1b0c3b0a923232dbcadcfc661bb08031d0
-
SHA256
a555018ed03a0b191f64f625b75cebd9f62c194c7b1c1a66b91266f2f1c1b6c4
-
SHA512
692d642223ddcff9e75e0d76437fbc760f9a356609fc4c3cccdddbdeb453f2bf04ce8438c3820b4445c320840a28f86215da880f1d8fe96dc9f65567e4505e67
-
SSDEEP
98304:6o4H5BopFuyJBk7f2lMmojnMH1u/FRrxrjUJMJCG:6oQ5Ba3k7LMH1u/rrxrjUJ0
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4