General
-
Target
17f43303c82bf997758d11a246902669.bin
-
Size
449KB
-
Sample
241021-bgph8asejp
-
MD5
184a7cb7408a2fbe6a8dff05858cc3e1
-
SHA1
02b2efa7f83b1679561e1aed0325b68d327ba664
-
SHA256
d18fa0e68c2ca1a424b1108304feb45c4fe5c84dbb2f422bb9500c4bb9eb5dfa
-
SHA512
be9c48219d4a4e0cbce67fdfb01e520bff264010364cf9e87257e8f5d565dd8d5984f7267c0c18539e5a43059788497ef0e601eed10b289489e565170943071d
-
SSDEEP
12288:1NjcxSwBhXkCJpUmEz+AFLHHvMOA7aKC8xTmgJ6y:DgxSwBhfUm2rUOV8x3J6y
Static task
static1
Behavioral task
behavioral1
Sample
910d5163c8b1b2b7c6c4a22195455143c8e2aac49f9b089d4fff6cfbbd781e78.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
910d5163c8b1b2b7c6c4a22195455143c8e2aac49f9b089d4fff6cfbbd781e78.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.1
0b3bd69430b7d827b107ba2ed809207d
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
910d5163c8b1b2b7c6c4a22195455143c8e2aac49f9b089d4fff6cfbbd781e78.exe
-
Size
496KB
-
MD5
17f43303c82bf997758d11a246902669
-
SHA1
7d4863c31780e3927b9993e6924297b6a281fe91
-
SHA256
910d5163c8b1b2b7c6c4a22195455143c8e2aac49f9b089d4fff6cfbbd781e78
-
SHA512
5fac221226f0cd76cc63ff942b458d50d12fe08bc432c4a1a7593c04ddd7676b54ea812593aa9b8fd8a1adbcec81f413752c7896f4be75a30bf323d303359d75
-
SSDEEP
12288:1myaTL4aY7+6iU9WGh691zRhbPdUQmeK3LbXCoL:1gTLSq6iEW66DrSQmv3LDC6
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4