General
-
Target
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.zip
-
Size
285KB
-
Sample
250208-twvb5avlaz
-
MD5
db2495ef28f8b32e927c048526b60af3
-
SHA1
60ee8de6255da85f99d1670a8f59fa41bc64531a
-
SHA256
44b6943b892a5d5268857efa67cd5a2afe60852bd321aceba607ada1fed0d2cd
-
SHA512
ce243a4a8b330290a4d98a7ee677217a02eb9066ddc499f1d3cc52d70289d36f13e3090acce65e73de03ff631d771cd6dbc284a5be0fc1834d0c059f8c01b7f5
-
SSDEEP
6144:uZxigbPAl9P7e6SHZpG/W6wZ8EavbmK9jxRtwAjk3t7c4699T5w:uZzWDGfPZ8EaTXnfjk3t7+99T5w
Static task
static1
Behavioral task
behavioral1
Sample
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Targets
-
-
Target
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1.exe
-
Size
360KB
-
MD5
216340f456c7adb3db07da2b551e1066
-
SHA1
a9623a90d83ac30a74f52ff9042647d4dad473ec
-
SHA256
aa226ab5c6754cbbf77de7e20a0bf76529cd7a7b1066df846c15aa89f6cbd0a1
-
SHA512
8625016bf03fb6b1cedf18371eb2fafa77f10df33ebf09ffa74ca0d79616dbf5544c72ab85317e06d8a8a97980b23681dddf88ce3df06f8df4f3ba68b15c3cbb
-
SSDEEP
6144:O/a19BSfmQl2G0GI++lx19BSfmQl2G0GI++lM:P19inIT19inIe
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1