General
-
Target
samples.zip
-
Size
1.2MB
-
Sample
250109-tdsetatnaw
-
MD5
15dbcae142bccf04df5d45247c8f8fd3
-
SHA1
888d5c96e87675331b113542c4e5218ae2319879
-
SHA256
a7a034b974a5b7b667be84e9c4fcefea839f6549d2e4fcc9409571ac4e69bee6
-
SHA512
6cb2626f47672b742e5448cae590f506909a8c4fa68d4a2475f3128d15c64a95ced8380b51b903869b5946e75445d3cb186e85c2737964d7ebda2905d3433c16
-
SSDEEP
24576:viE4FqAXnVmssiBifT4c4lYOt8ZspXGlEGA0om+KE+oKkhXSMSzvw:vpBAXPj+T4JYO8PJPJySMSzY
Static task
static1
Behavioral task
behavioral1
Sample
235be22a82cb8890d91c8cd29992fd044a3c802cc0bc55ee293e14ae54700cfb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
235be22a82cb8890d91c8cd29992fd044a3c802cc0bc55ee293e14ae54700cfb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.1
91ee094dd9ffff7505d0f982e8e1ca3f
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
Targets
-
-
Target
235be22a82cb8890d91c8cd29992fd044a3c802cc0bc55ee293e14ae54700cfb
-
Size
2.6MB
-
MD5
d7562595687f6b52a4e90b35f2280b04
-
SHA1
94a0bd3516d85169faa13ca86cd12ff5f65b4532
-
SHA256
235be22a82cb8890d91c8cd29992fd044a3c802cc0bc55ee293e14ae54700cfb
-
SHA512
f45db5023061b06797400c1d6815a4b34d3f260942737365781015dc31b34115449ad5832b30010f5fbb2590206757939c748ccbf589efaab0b016c2a8059c2e
-
SSDEEP
49152:IKQXc2DfKCPpOSGoA2W5lu7hPHzLNLPnARaLrctI4g+xSfD913Ax3UjgJgI+WpnS:f7gfDA2zxzLNLPARayEj
-
Detect Vidar Stealer
-
Vidar family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1