General
-
Target
trigger.ps1
-
Size
1021B
-
Sample
241222-1adwksznar
-
MD5
6ef2f9449166c05acc12dbfcceaeb206
-
SHA1
400ccd98d4cf1a1384421ce863aa1de9d7ae371c
-
SHA256
33b832ed5ea4802a7dd24baf59f5b1380e2ce20b2739cca89b6f2f0e1c6f9da3
-
SHA512
f843aaf898a8e3b59f61dd06f1b397c77a97417502f1a0a312a77568592ed397011dad1e95ec50f6c55099d352d02d472c91b701e2c8793c05a2d9f25a589b53
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win7-20240903-en
Malware Config
Extracted
https://github.com/att1sb/seca/raw/refs/heads/main/BowlLicensed.exe
Targets
-
-
Target
trigger.ps1
-
Size
1021B
-
MD5
6ef2f9449166c05acc12dbfcceaeb206
-
SHA1
400ccd98d4cf1a1384421ce863aa1de9d7ae371c
-
SHA256
33b832ed5ea4802a7dd24baf59f5b1380e2ce20b2739cca89b6f2f0e1c6f9da3
-
SHA512
f843aaf898a8e3b59f61dd06f1b397c77a97417502f1a0a312a77568592ed397011dad1e95ec50f6c55099d352d02d472c91b701e2c8793c05a2d9f25a589b53
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-