General
-
Target
S0FTWARE.exe
-
Size
782.2MB
-
Sample
241228-f11g2swlc1
-
MD5
bd166012acef52ffce31789bafff6588
-
SHA1
e2968f7f62266d05b4628c6351a676d5d0e8e22f
-
SHA256
3aaa6bb7d6b82cc554bb14493af5afe184125089a9aa1c3759b82fbb7241c87a
-
SHA512
d8786f5ebc199c667924e697bce5b4185492161af351511145d91c47c06df56b1b50b6520f3b9ce6bc37a1bb1b9b9ba6fbe18f1f3f881d7dbe8cb28990e2c3c3
-
SSDEEP
98304:qD8PPKKvxZbk8aPZXMc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBck:m8PJk8ae
Behavioral task
behavioral1
Sample
S0FTWARE.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
11.5
58b6d099477b3b8d6d299990bbc1d5a6
https://t.me/gos90t
https://steamcommunity.com/profiles/76561199800374635
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
S0FTWARE.exe
-
Size
782.2MB
-
MD5
bd166012acef52ffce31789bafff6588
-
SHA1
e2968f7f62266d05b4628c6351a676d5d0e8e22f
-
SHA256
3aaa6bb7d6b82cc554bb14493af5afe184125089a9aa1c3759b82fbb7241c87a
-
SHA512
d8786f5ebc199c667924e697bce5b4185492161af351511145d91c47c06df56b1b50b6520f3b9ce6bc37a1bb1b9b9ba6fbe18f1f3f881d7dbe8cb28990e2c3c3
-
SSDEEP
98304:qD8PPKKvxZbk8aPZXMc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBck:m8PJk8ae
-
Detect Vidar Stealer
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-