Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://recaptcha-dns-b4.pages.dev
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://raw.githubusercontent.com/BrianSL16/effective-meme/refs/heads/main/mutation.txt
Targets
-
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-