Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe
-
Size
6.2MB
-
MD5
6dc517f58f112adcdd3cfae606a67964
-
SHA1
b59f74642e963111027613ce0206ca77aec06fda
-
SHA256
2a559ce1ff609781226319d7f57d6c8cf32487bd87bb796ea43ee015aa104a73
-
SHA512
6f04ac98d9ea1eb203d2b93e9ff9f02a26b2ff61a4afc61b47f5d7f6260a80bc085fbc24c97c43407651c231156f468d4fe00cb152e64c6be948fed6b19f4ed8
-
SSDEEP
98304:cTiMEvjmzKewwsZ2XoCx7fR+Q6VCKrUk:iiMEaI24C1UQszrU
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/2420-4-0x0000000000570000-0x0000000000870000-memory.dmp family_vidar_v7 behavioral1/memory/2420-7-0x0000000000570000-0x0000000000870000-memory.dmp family_vidar_v7 behavioral1/memory/2420-2-0x0000000000570000-0x0000000000870000-memory.dmp family_vidar_v7 -
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30 PID 3052 wrote to memory of 2420 3052 2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-30_6dc517f58f112adcdd3cfae606a67964_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:2420
-