General
-
Target
downloader.exe
-
Size
30.1MB
-
Sample
250121-p6pr6svncr
-
MD5
44587b1e41b785cb2f8cd0d3dc282276
-
SHA1
222be625061bf4b830a7dd5fc2be5e581352ae85
-
SHA256
7e26322a3252a0a583435dd06fcc8827157876daf32796b117bac7045b86b149
-
SHA512
f5ea163edbcc9ce46c6e09a7043036a261393358f95223253913d7eb6b076567c6d497769b0649d6c52614f46a97dbf59429af804e5a0adcbbf253d4fad5a0cb
-
SSDEEP
393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mgQ96l+ZArYsFRlc:R3on1HvSzxAMNQFZArYs0
Static task
static1
Behavioral task
behavioral1
Sample
downloader.exe
Resource
win7-20241010-en
Malware Config
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Extracted
xworm
3.1
83.38.24.1:1603
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Targets
-
-
Target
downloader.exe
-
Size
30.1MB
-
MD5
44587b1e41b785cb2f8cd0d3dc282276
-
SHA1
222be625061bf4b830a7dd5fc2be5e581352ae85
-
SHA256
7e26322a3252a0a583435dd06fcc8827157876daf32796b117bac7045b86b149
-
SHA512
f5ea163edbcc9ce46c6e09a7043036a261393358f95223253913d7eb6b076567c6d497769b0649d6c52614f46a97dbf59429af804e5a0adcbbf253d4fad5a0cb
-
SSDEEP
393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mgQ96l+ZArYsFRlc:R3on1HvSzxAMNQFZArYs0
-
Detect Vidar Stealer
-
Detect Xworm Payload
-
Vidar family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-