General
-
Target
random.exe
-
Size
883KB
-
Sample
250126-p4tckssrdr
-
MD5
9ce7b5dc80b072328c7bbcdb1c787941
-
SHA1
7ec1102c335fc5db907c9ee2dcc0ec2ab3f6196a
-
SHA256
d264ece444ce4f309f8abb6624a948b7e475b0ea41922a167b2c206a99a2f3ed
-
SHA512
e559fc4c461dc51d6e528781079b5705a48190e1e1523fa88a44ea083ce4c36e26f49cc266dc7bf7e94a1a8d644c252c04a3f8a75ee75d5e13632cb55d366ebf
-
SSDEEP
24576:92AkXmXG/wzcVn5eiBOdsd1NvyiOIMEWozYL:umXGAcVN8dsFaiXvWeu
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Targets
-
-
Target
random.exe
-
Size
883KB
-
MD5
9ce7b5dc80b072328c7bbcdb1c787941
-
SHA1
7ec1102c335fc5db907c9ee2dcc0ec2ab3f6196a
-
SHA256
d264ece444ce4f309f8abb6624a948b7e475b0ea41922a167b2c206a99a2f3ed
-
SHA512
e559fc4c461dc51d6e528781079b5705a48190e1e1523fa88a44ea083ce4c36e26f49cc266dc7bf7e94a1a8d644c252c04a3f8a75ee75d5e13632cb55d366ebf
-
SSDEEP
24576:92AkXmXG/wzcVn5eiBOdsd1NvyiOIMEWozYL:umXGAcVN8dsFaiXvWeu
-
Detect Vidar Stealer
-
Vidar family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-