Behavioral task
behavioral1
Sample
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce.exe
Resource
win10v2004-20241007-en
General
-
Target
0a7b3454fdad8431bd3523648c915665.bin
-
Size
149KB
-
MD5
8edd53c4ca6515334ea88224f9d0e992
-
SHA1
b84146ff89c5a6f5b7d215f3802991f2403fc74b
-
SHA256
dc154a3e2e3a5937a626a3b2456a95a1265d064a3e7c612ee809990783703367
-
SHA512
09ee64ae59a1745433a89a9fd5ec74a0e4d3c7f3781b472c463b3c2914ae476f37d41f10a7852693de1c637f5df77b041a946454954101161f90c01d1ac5fbae
-
SSDEEP
3072:TGjri+poHs16DmmOs00ETv2rMGk42cgFv+HVd09la1cbdq:Cj2+uyNCgv2rMGkp9+HVdQbdq
Malware Config
Extracted
vidar
11.8
41d35cbb974bc2d1287dcd4381b4a2a8
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule static1/unpack001/baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce.exe family_vidar_v7 -
Stealc family
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce.exe
Files
-
0a7b3454fdad8431bd3523648c915665.bin.zip
Password: infected
-
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce.exe.exe windows:5 windows x86 arch:x86
Password: infected
0b8c3b7f5974cb002243977711d52689
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_mbscmp
_splitpath
memmove
strstr
strncpy
malloc
_wtoi64
??_V@YAXPAX@Z
atexit
strcpy_s
memchr
strchr
strtok_s
??_U@YAPAXI@Z
_time64
srand
rand
_ismbcupper
__CxxFrameHandler3
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapSize
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSetInformation
GetCommandLineA
ExitProcess
SetCriticalSectionSpinCount
FlsAlloc
HeapAlloc
GetCurrentProcess
HeapFree
VirtualFree
GetProcessHeap
WriteFile
VirtualAllocExNuma
Sleep
ReadFile
CreateFileW
lstrcatA
MultiByteToWideChar
GetTempPathW
GetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
GlobalMemoryStatusEx
ConvertDefaultLocale
lstrcmpiW
GetModuleHandleA
VirtualProtect
CloseHandle
lstrlenA
CreateFileA
GetFileSize
FreeLibrary
GetThreadContext
SetThreadContext
SetHandleCount
VirtualAllocEx
WriteProcessMemory
VirtualQueryEx
OpenProcess
GetComputerNameA
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
CreateProcessA
CreateDirectoryA
FindFirstFileA
GetLogicalDriveStringsA
FindClose
FindNextFileA
CreateThread
SetFilePointer
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SystemTimeToFileTime
GetTickCount
GetLocalTime
CreateFileMappingA
GetFileInformationByHandle
lstrcpyA
TlsGetValue
TlsAlloc
GetModuleFileNameW
GetStdHandle
GetModuleHandleW
HeapDestroy
HeapCreate
RtlUnwind
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
DecodePointer
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
HeapReAlloc
GetFileType
QueryPerformanceCounter
GetStartupInfoW
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
ReadProcessMemory
GetStringTypeW
UnhandledExceptionFilter
TerminateProcess
TlsFree
RaiseException
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
IsProcessorFeaturePresent
SetConsoleCtrlHandler
InterlockedExchange
GetLocaleInfoW
LoadLibraryW
TlsSetValue
user32
wsprintfA
GetDesktopWindow
OpenDesktopA
CreateDesktopA
CloseDesktop
OpenInputDesktop
wsprintfW
IsDialogMessageW
MessageBoxA
GetWindowLongW
ReleaseDC
GetWindowContextHelpId
GetCursorPos
SetThreadDesktop
RegisterClassW
IsWindowVisible
CharToOemA
gdi32
CreateDCA
GetDeviceCaps
advapi32
RegGetValueA
RegOpenKeyExA
GetUserNameA
GetCurrentHwProfileA
shell32
SHFileOperationA
SHGetFolderPathA
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
oleaut32
VariantClear
SysFreeString
VariantInit
SysAllocString
psapi
GetModuleBaseNameA
EnumProcessModules
ws2_32
connect
WSAStartup
getaddrinfo
htons
WSACleanup
recv
socket
freeaddrinfo
closesocket
send
shlwapi
ord155
PathFileExistsA
Sections
.text Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ