General
-
Target
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.zip
-
Size
285KB
-
Sample
250208-t671zaxkck
-
MD5
db2495ef28f8b32e927c048526b60af3
-
SHA1
60ee8de6255da85f99d1670a8f59fa41bc64531a
-
SHA256
44b6943b892a5d5268857efa67cd5a2afe60852bd321aceba607ada1fed0d2cd
-
SHA512
ce243a4a8b330290a4d98a7ee677217a02eb9066ddc499f1d3cc52d70289d36f13e3090acce65e73de03ff631d771cd6dbc284a5be0fc1834d0c059f8c01b7f5
-
SSDEEP
6144:uZxigbPAl9P7e6SHZpG/W6wZ8EavbmK9jxRtwAjk3t7c4699T5w:uZzWDGfPZ8EaTXnfjk3t7+99T5w
Static task
static1
Behavioral task
behavioral1
Sample
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Targets
-
-
Target
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.exe
-
Size
360KB
-
MD5
216340f456c7adb3db07da2b551e1066
-
SHA1
a9623a90d83ac30a74f52ff9042647d4dad473ec
-
SHA256
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1
-
SHA512
8625016bf03fb6b1cedf18371eb2fafa77f10df33ebf09ffa74ca0d79616dbf5544c72ab85317e06d8a8a97980b23681dddf88ce3df06f8df4f3ba68b15c3cbb
-
SSDEEP
6144:O/a19BSfmQl2G0GI++lx19BSfmQl2G0GI++lM:P19inIT19inIe
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1