General
-
Target
b2388c47229aa697c2ce8d0a4b868c3f789238291c8e7d2856e77854d05b4caf
-
Size
943KB
-
Sample
241031-vzr7lstjej
-
MD5
6489e80734a30f58db671eb9151d2168
-
SHA1
92fd0895a2b8aec14f50eea52439af0e014488b6
-
SHA256
b2388c47229aa697c2ce8d0a4b868c3f789238291c8e7d2856e77854d05b4caf
-
SHA512
20861f5abddccfa07d5249afdac6171a8d08df837eb9e0b7329d8c14e6eb47f288d7bb8c3f4b2d8b99c555d28ea308c3f35c546c1718ac87e48e74982afc4071
-
SSDEEP
24576:+jfMVHefX7eO2wgYPMGNL/geFyNcTN+jv75TQn652VBuNyb2i:8EQreOVgRGJtF4ch+jvNm0Nyb2
Behavioral task
behavioral1
Sample
b2388c47229aa697c2ce8d0a4b868c3f789238291c8e7d2856e77854d05b4caf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b2388c47229aa697c2ce8d0a4b868c3f789238291c8e7d2856e77854d05b4caf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
b2388c47229aa697c2ce8d0a4b868c3f789238291c8e7d2856e77854d05b4caf
-
Size
943KB
-
MD5
6489e80734a30f58db671eb9151d2168
-
SHA1
92fd0895a2b8aec14f50eea52439af0e014488b6
-
SHA256
b2388c47229aa697c2ce8d0a4b868c3f789238291c8e7d2856e77854d05b4caf
-
SHA512
20861f5abddccfa07d5249afdac6171a8d08df837eb9e0b7329d8c14e6eb47f288d7bb8c3f4b2d8b99c555d28ea308c3f35c546c1718ac87e48e74982afc4071
-
SSDEEP
24576:+jfMVHefX7eO2wgYPMGNL/geFyNcTN+jv75TQn652VBuNyb2i:8EQreOVgRGJtF4ch+jvNm0Nyb2
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4