Analysis
-
max time kernel
27s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-02-2025 06:18
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20250207-en
General
-
Target
Setup.exe
-
Size
78.9MB
-
MD5
2879c2ed17dfcdcf548cc71de5ef374b
-
SHA1
5697a85f1f38149723a157697523f36932fa880c
-
SHA256
c5ff8c9ec98f44163a3da8555205f97ab01392216e371fe3e9f81f142f387bb3
-
SHA512
0cd7bb8b86470a2dc21d23ffb69a14dcd1f07896399de50a8171b76cb5e342c6a72b6b0fb7379652aa71f0ae69fc1ac30350b959906e29e2896461c9a92c7023
-
SSDEEP
98304:Ugh4cAFlG+Jhhwb+8MeGx2RVtT42cPcUaIp2vUsMiLJ:xhRAO+UJR82SOv
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/2796-1-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2796-2-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2796-3-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 2796 3048 Setup.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30 PID 3048 wrote to memory of 2796 3048 Setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2796
-