General
-
Target
nottheactualsoftwareiwanttotest.zip
-
Size
22.6MB
-
Sample
241102-smfxps1jcq
-
MD5
395c0af1d4f7e556d341a4d0d230edbe
-
SHA1
0a7fe98082e026aed44690ccc2d1b8020da65ba2
-
SHA256
4d018e44351c218cb3a0714fc7d91c08b2bf24dc8d87b5e1cd26a799a7bd20af
-
SHA512
61427eb84866f784b304e017c8b3c8c98cf180a4d75fd49738c03d3aee187041f23781384626b369eda564c917f86d121f9d4dedb12ac70ade4387606f2bb915
-
SSDEEP
393216:mbNnIFdAyvA41ICzJgkPi9GqlcX3KfoHgFparDqY0Ib2Py1bpd98lbppy1/dLkOO:mbNnSdAgI81qQKf4ioqfLK1bpX8hpA1e
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
setup.exe
-
Size
22.9MB
-
MD5
fc3f90ab25420ebc544eef678344b3f9
-
SHA1
f5db3020443e8cb4d7f1f02da54564387561e87e
-
SHA256
dcd7ecf212b8725d0c68daeb2f0939978a15f90510d0ca776f921183a19530b1
-
SHA512
a650eee94ef8155c767e8c3a004622c7bf01e1a673b99899baf44aabc065507c8be968208f0fc1e2f97bc957ee0137c76920bc919f425b4d09a9f2665675aa12
-
SSDEEP
393216:xoprrm1peunqyXIO5gw+tU//6B+3fYv/4TIyM6Gej4vkHpFLbY9N7Bunm/aMOQYQ:eprrWpeYIR66CYvO5Mdh8HpFnY77sn4l
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4