General
-
Target
Unlock_Tool_v2.5.9.exe
-
Size
2.7MB
-
Sample
241113-sexv9avajn
-
MD5
e66371441b6223c517e381cfbe8e1864
-
SHA1
2ac93eca52938e19c086550807923a85800e97a1
-
SHA256
736ff6e041158ab21fae0f3dc2f2389f2d1baf9186e60d75900c2a71552de95b
-
SHA512
8aa02d9df0ee8ab6c43c8d7883a9ecfebb1f0957bb61a1101d6331324c28e0496f0c654be548ce34f9f76a08a0c102b3239c6c4b4f0457e708ba980c488d6e3c
-
SSDEEP
49152:9t0WJo6iw2+BCBhyGDz7cep+/Cz3ddQn0xIpxg2Wv9SJu3YpDg1xUpDg1xQ:AQi2E9KidQn0xIpxg2Wv94pM1CpM16
Static task
static1
Behavioral task
behavioral1
Sample
Unlock_Tool_v2.5.9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Unlock_Tool_v2.5.9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.7
4b05932e298d86a233eec0514ef2c4f6
https://t.me/m07mbk
https://steamcommunity.com/profiles/76561199801589826
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
Unlock_Tool_v2.5.9.exe
-
Size
2.7MB
-
MD5
e66371441b6223c517e381cfbe8e1864
-
SHA1
2ac93eca52938e19c086550807923a85800e97a1
-
SHA256
736ff6e041158ab21fae0f3dc2f2389f2d1baf9186e60d75900c2a71552de95b
-
SHA512
8aa02d9df0ee8ab6c43c8d7883a9ecfebb1f0957bb61a1101d6331324c28e0496f0c654be548ce34f9f76a08a0c102b3239c6c4b4f0457e708ba980c488d6e3c
-
SSDEEP
49152:9t0WJo6iw2+BCBhyGDz7cep+/Cz3ddQn0xIpxg2Wv9SJu3YpDg1xUpDg1xQ:AQi2E9KidQn0xIpxg2Wv94pM1CpM16
-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4