General
-
Target
2024-10-24_2de3b8a9be7fe7421373710133cb11cd_mafia_rhadamanthys
-
Size
2.7MB
-
Sample
241024-htzy2sxhnf
-
MD5
2de3b8a9be7fe7421373710133cb11cd
-
SHA1
0ad7089366c55014850ec370de637c27e6348902
-
SHA256
2b74c2685d3bc1504f20bb93af1a0bf3fb3ec2090b3298b8f025be4550789859
-
SHA512
f7d4aa8188ca7a71eb6978be6191738153134d584d9a8be377bfdbf34c799274b2ff711994a32de41a3a7d01247c78f597f9e280f35145cbf06ae515b02a7693
-
SSDEEP
49152:5moJ67eQD9rSltthuDZzjz4YVwXrfR+4CZpo+awj2XIzq:8ncudzjz4Ywzw4Gaw7q
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-24_2de3b8a9be7fe7421373710133cb11cd_mafia_rhadamanthys.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-24_2de3b8a9be7fe7421373710133cb11cd_mafia_rhadamanthys.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.1
91ee094dd9ffff7505d0f982e8e1ca3f
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
Targets
-
-
Target
2024-10-24_2de3b8a9be7fe7421373710133cb11cd_mafia_rhadamanthys
-
Size
2.7MB
-
MD5
2de3b8a9be7fe7421373710133cb11cd
-
SHA1
0ad7089366c55014850ec370de637c27e6348902
-
SHA256
2b74c2685d3bc1504f20bb93af1a0bf3fb3ec2090b3298b8f025be4550789859
-
SHA512
f7d4aa8188ca7a71eb6978be6191738153134d584d9a8be377bfdbf34c799274b2ff711994a32de41a3a7d01247c78f597f9e280f35145cbf06ae515b02a7693
-
SSDEEP
49152:5moJ67eQD9rSltthuDZzjz4YVwXrfR+4CZpo+awj2XIzq:8ncudzjz4Ywzw4Gaw7q
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4