General
-
Target
a9157bff7034c95796152201796c6f97530e27277429af9ff350ac554bd37939
-
Size
1.6MB
-
Sample
241105-n27lrazmb1
-
MD5
90cace0b799aaad6cfc9436953f75652
-
SHA1
13b3102f25ad542cae0628fdd0880ac147a1b5b0
-
SHA256
a9157bff7034c95796152201796c6f97530e27277429af9ff350ac554bd37939
-
SHA512
6ed16a6403d8801e84db3b81de2b0f6d4702b9b60fff80e331e6e124e9145a5b1226b121a0c05258686a70b12b78afd4434e5be956e564615c4a6146c9a61a9c
-
SSDEEP
49152:GhX126vTMGbSNquzod7fQzEytWlIu5LyaH8b:ol26LM3NI1QYytWlIu5LyaW
Static task
static1
Behavioral task
behavioral1
Sample
a9157bff7034c95796152201796c6f97530e27277429af9ff350ac554bd37939.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a9157bff7034c95796152201796c6f97530e27277429af9ff350ac554bd37939.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
a9157bff7034c95796152201796c6f97530e27277429af9ff350ac554bd37939
-
Size
1.6MB
-
MD5
90cace0b799aaad6cfc9436953f75652
-
SHA1
13b3102f25ad542cae0628fdd0880ac147a1b5b0
-
SHA256
a9157bff7034c95796152201796c6f97530e27277429af9ff350ac554bd37939
-
SHA512
6ed16a6403d8801e84db3b81de2b0f6d4702b9b60fff80e331e6e124e9145a5b1226b121a0c05258686a70b12b78afd4434e5be956e564615c4a6146c9a61a9c
-
SSDEEP
49152:GhX126vTMGbSNquzod7fQzEytWlIu5LyaH8b:ol26LM3NI1QYytWlIu5LyaW
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4