General
-
Target
NеwIns.exe
-
Size
1.7MB
-
Sample
241101-r55s4sznfv
-
MD5
ebe0d35f9fcef8de203e66b161aa5f9a
-
SHA1
3788ce60f120e76498ab6713aa26d112f61e54f8
-
SHA256
a4e0fd3483e26b4c0dfda5b2c1cb89571e06a8162e88b8a47a810a4b38934b1f
-
SHA512
333c3e173a06f9b968c5a273511f164a9526109a9570b06539b9d407089e9ab3a93db0e1d950bf172d45c054c6fb73fe93954f3a541a4d2e38e6d321567a2ef1
-
SSDEEP
24576:JsK9iuA276atJZnHp336Ps2QavGGkUlN2bWbK9P64qIxvE9HC9q+iKlGr4Okc6j6:J9iuAWJNJ336bz+Gp2b96j6xG8Q6jLG
Static task
static1
Behavioral task
behavioral1
Sample
NеwIns.exe
Resource
win11-20241023-en
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
NеwIns.exe
-
Size
1.7MB
-
MD5
ebe0d35f9fcef8de203e66b161aa5f9a
-
SHA1
3788ce60f120e76498ab6713aa26d112f61e54f8
-
SHA256
a4e0fd3483e26b4c0dfda5b2c1cb89571e06a8162e88b8a47a810a4b38934b1f
-
SHA512
333c3e173a06f9b968c5a273511f164a9526109a9570b06539b9d407089e9ab3a93db0e1d950bf172d45c054c6fb73fe93954f3a541a4d2e38e6d321567a2ef1
-
SSDEEP
24576:JsK9iuA276atJZnHp336Ps2QavGGkUlN2bWbK9P64qIxvE9HC9q+iKlGr4Okc6j6:J9iuAWJNJ336bz+Gp2b96j6xG8Q6jLG
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4