General
-
Target
Unlock_Tool.zip
-
Size
53.6MB
-
Sample
241029-dtg11s1qgx
-
MD5
60ea19e5e426a3c65fd7e1d9b8b93b78
-
SHA1
997fa5eb16cc05653d767218faf217587030c644
-
SHA256
bc1e335f23c95ab3e41f7b94c9b3b4c140a09361c508587d38d720a54141faf8
-
SHA512
b75ef329af812937a952a0e78f745a50f9507758dfc5b792969b47e7d9256144f79d12fbab6c3c249b76713c87554940489d0641e4aa2b861072c4b08d06520d
-
SSDEEP
1572864:GMlvVJdOWRPdH2N0injqfW6Z8MkK1kP4qq7nGcuzB:flNJdJHc7n+f98MP1NJ4B
Static task
static1
Behavioral task
behavioral1
Sample
Unlock_Tool_2.4.1.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Unlock_Tool_2.4.1.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
Unlock_Tool_2.4.1.rar
-
Size
53.6MB
-
MD5
2b6f6b54f320a7322f04426a99085966
-
SHA1
b014af8aaa98fa422265de9fa4522cbdef12641f
-
SHA256
28bf5e3b9fb5485c3e98fcf3a98ed61884bbf9419fddad53855ce08284d6b97c
-
SHA512
4645fa85b041e77a1318e7b4aea73281f85586ca3280a3bb77cca47999f0c786ee178a406c1f74d5e12562a3548ce442ff345ea73204e9c010474ff610dd784e
-
SSDEEP
1572864:aMlvVJdOWRPdH2N0injqfW6Z8MkK1kP4qq7nGcuz6:rlNJdJHc7n+f98MP1NJ46
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-