General
-
Target
fc279f2d04c64f49776605d028fd002930a803a49ff4711847b5025a76de1867N
-
Size
1.2MB
-
Sample
241102-vlaemszenc
-
MD5
39dc4e7aa1db2a3eb2443ea94fc30810
-
SHA1
e99a14c9c19a38e65ba11cf553cd0caa7a99a99a
-
SHA256
fc279f2d04c64f49776605d028fd002930a803a49ff4711847b5025a76de1867
-
SHA512
c1ab6354dd79f025cbca5195598672ad436a48ba5fe8b9716db206f15abe5fff41b896f0aebeb009cc2e510667944649c5a4c7ee518d3e33ba432ea2dbffee2b
-
SSDEEP
24576:bI4I50fsFt+jC1OVomH2F5ZdUDY+rRaGDqdmnJpRpaeya7lk2Zrxb:m50ItCGmY5Zd+rRJDqdCpfacCMB
Static task
static1
Behavioral task
behavioral1
Sample
fc279f2d04c64f49776605d028fd002930a803a49ff4711847b5025a76de1867N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc279f2d04c64f49776605d028fd002930a803a49ff4711847b5025a76de1867N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
fc279f2d04c64f49776605d028fd002930a803a49ff4711847b5025a76de1867N
-
Size
1.2MB
-
MD5
39dc4e7aa1db2a3eb2443ea94fc30810
-
SHA1
e99a14c9c19a38e65ba11cf553cd0caa7a99a99a
-
SHA256
fc279f2d04c64f49776605d028fd002930a803a49ff4711847b5025a76de1867
-
SHA512
c1ab6354dd79f025cbca5195598672ad436a48ba5fe8b9716db206f15abe5fff41b896f0aebeb009cc2e510667944649c5a4c7ee518d3e33ba432ea2dbffee2b
-
SSDEEP
24576:bI4I50fsFt+jC1OVomH2F5ZdUDY+rRaGDqdmnJpRpaeya7lk2Zrxb:m50ItCGmY5Zd+rRJDqdCpfacCMB
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4