General
-
Target
nouveau.bat
-
Size
97B
-
Sample
250212-vzgqwa1kdr
-
MD5
6c6d012324d2e576b72ff7ed88f34c2e
-
SHA1
c956c1642bda663f0f41ce31571731c0e5af1d91
-
SHA256
ad94cad57a4d8181d40502c1cde3b95774308f9295dda3546bdb357e732949d3
-
SHA512
cbd33eb2052b5e94305a78c99bc53dcf3c8681d283e41860f6d3b41a818bf0b5e15f40f4fa86d0544ab77d44844bde1c9c32f341b520572e000d3b88048599ac
Static task
static1
Behavioral task
behavioral1
Sample
nouveau.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
nouveau.bat
Resource
win10v2004-20250211-en
Malware Config
Extracted
vidar
https://t.me/b4cha00
https://steamcommunity.com/profiles/76561199825403037
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0
Targets
-
-
Target
nouveau.bat
-
Size
97B
-
MD5
6c6d012324d2e576b72ff7ed88f34c2e
-
SHA1
c956c1642bda663f0f41ce31571731c0e5af1d91
-
SHA256
ad94cad57a4d8181d40502c1cde3b95774308f9295dda3546bdb357e732949d3
-
SHA512
cbd33eb2052b5e94305a78c99bc53dcf3c8681d283e41860f6d3b41a818bf0b5e15f40f4fa86d0544ab77d44844bde1c9c32f341b520572e000d3b88048599ac
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-