General
-
Target
Unlock_Tool_v2.7.2.exe
-
Size
394KB
-
Sample
241124-1y6w9sxqfq
-
MD5
a97003b5a7144d1985df6a56703b46a8
-
SHA1
9ac31ccd5ab210e37c6010a8eac13a06e1a1272d
-
SHA256
f0f7e757f603541f02c8c1dfdaa8d6c1cbff4a4a8c0f0de49453bb68330b272e
-
SHA512
9fb8746a9243a7705ed7ea0d0e071b4785e726f0644787f375a92a89c2f4cd71ad59f81432a79ca09ccaaa89895a64181a784395b607e2303b694ef9517bebcb
-
SSDEEP
12288:I9yzNBedBB42AZPApmqjZi+oG67lz+MSg07Z6fmIwVqzQ:I9yzNBe14PP42H0pN8c
Static task
static1
Behavioral task
behavioral1
Sample
Unlock_Tool_v2.7.2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Unlock_Tool_v2.7.2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.8
68fa61169d8a1f0521b8a06aa1f33efb
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
Unlock_Tool_v2.7.2.exe
-
Size
394KB
-
MD5
a97003b5a7144d1985df6a56703b46a8
-
SHA1
9ac31ccd5ab210e37c6010a8eac13a06e1a1272d
-
SHA256
f0f7e757f603541f02c8c1dfdaa8d6c1cbff4a4a8c0f0de49453bb68330b272e
-
SHA512
9fb8746a9243a7705ed7ea0d0e071b4785e726f0644787f375a92a89c2f4cd71ad59f81432a79ca09ccaaa89895a64181a784395b607e2303b694ef9517bebcb
-
SSDEEP
12288:I9yzNBedBB42AZPApmqjZi+oG67lz+MSg07Z6fmIwVqzQ:I9yzNBe14PP42H0pN8c
-
Detect Vidar Stealer
-
Stealc family
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4