Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2025 13:44

General

  • Target

    1.exe

  • Size

    272KB

  • MD5

    dbdfd9ab774d8fa5a56718b1fae7bc95

  • SHA1

    df4c5c42e6b8d3c7324a34a2b017f362d9213558

  • SHA256

    604c471648621880aeceac0534190b14e8c3ea05d4bc5bb95a8e777dd82e65aa

  • SHA512

    d3478dd32f89105cd62997f539961bb69a7eb08ca614f9185c29a32cb96f3dbc87638fea6eb09717ad67696d5aab1a39373aaddf0fd0c057ea6787346d7a31c8

  • SSDEEP

    3072:ne/3hGz8Su8ucwsy7vf7Qy63S9scCh4slxWsr7i9W3WWsZHpV0iukwEEfzqygF/S:n6xqucZy7vf8f3oMRxb/3W1Hp91Gq

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/m08mbk

https://steamcommunity.com/profiles/76561199820567237

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5D6572AFCCAAA3EF163F973A32CEF917

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5D6572AFCCAAA3EF163F973A32CEF917

    Filesize

    414B

    MD5

    8a6cdd21ea4bbb6d40912a4faecb7666

    SHA1

    94e5966ec77f1d1e49930de8bde53f7f5733d651

    SHA256

    31796b6c3b29e33e193b517d456e3dea19e45bd79b14359af20ba7875ffad76c

    SHA512

    2c38b66379f4f7ab393d9a3b88a600c0c0355ad7bf52c2b4bf399c08786402d959df32d0948f6367c724d3a338a1b4587dd214dab97fc7053f718069a5f0740d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5D6572AFCCAAA3EF163F973A32CEF917

    Filesize

    414B

    MD5

    01e8b372f237200537a29e44282d5902

    SHA1

    8c7927148a6302c9b3f762d7568cf41b72e2e4c7

    SHA256

    5ebfcea5cc8b32e1ad92708a7fe89acda5184b17c90c23f503951d3270ec5435

    SHA512

    ead84e29a8ca3a81a35295abdfb6a64ff06f43c63609ec3866c8160c60d2e32cfe008218fb0b7a5dd3b65057bd6b95c5f9107066f061ba3372f70fa497b75a8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5D6572AFCCAAA3EF163F973A32CEF917

    Filesize

    414B

    MD5

    98967165b5fb4b30f94308e989b8e22a

    SHA1

    6879a52df5f8d701b7399983741eeb8c1a5ef9d7

    SHA256

    58f6b33407b1e8fad24bdf5052bda8206fe740efc98ba00e4831c3f6eb204072

    SHA512

    f68fe7800d867933ac539cc8714d3a6b64946393bf9a7634968e061d12702329374c436ad84ecdb8d94b30f43c8153d8772b4dda5d3acbb684db9bb525b3404b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bd0212482456e6a67de1d6c5138c3a0

    SHA1

    83c2bb8a31c891917b8b2928d1ad998c362e1e71

    SHA256

    31be7652e60dd154abcd483014a4ed73f4869d67dedbd07259f9eed5b58a593e

    SHA512

    c0aa44a1eaba67960803ed2d64bc481c4609ab6c95ac57c076c12810765a367bcc34c24a35d3b74fd41f55cfed840f53cc120a1f365c826d22bb7e707541a5d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    540e0357c0fc8722857019721119b69e

    SHA1

    6daa84e3acebdf7545cd7d988f622ecfc00140c7

    SHA256

    b768e392e99d884b7f9a432f84eafda65344e739bff0d53dd985e28119209d05

    SHA512

    e0b0b125a8ab24ab3d7b9bd47632ca5ee00fad3d78b69c588ca2fe080dd4007b9a2e318e1e136db3eba2a50885aec2d1becaaffde014e4e5050780afda2be6f1

  • C:\Users\Admin\AppData\Local\Temp\CabC52.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC84.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2424-0-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2424-377-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB