General
-
Target
file.ps1
-
Size
29B
-
Sample
250213-qhvtysxrgr
-
MD5
726ac161772f83ef4c852d6c3e158e86
-
SHA1
66b5487d1d873300d241e96fed4e1ba5d8fea2af
-
SHA256
630f2e9dc252f71613a30aaf3544739785a64f3f6fc96fbcc960511b29e0eced
-
SHA512
0b103e71e1a6b5ba400981f45ba460290ec97bd424a80ed4675b12aa68e9d3426bc253c5ae63ad4deba146b69a10b8f532c40344e6194482c3cc73bc4ab95910
Static task
static1
Behavioral task
behavioral1
Sample
file.ps1
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral2
Sample
file.ps1
Resource
win11-20250210-en
Malware Config
Extracted
vidar
https://t.me/b4cha00
https://steamcommunity.com/profiles/76561199825403037
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0
Targets
-
-
Target
file.ps1
-
Size
29B
-
MD5
726ac161772f83ef4c852d6c3e158e86
-
SHA1
66b5487d1d873300d241e96fed4e1ba5d8fea2af
-
SHA256
630f2e9dc252f71613a30aaf3544739785a64f3f6fc96fbcc960511b29e0eced
-
SHA512
0b103e71e1a6b5ba400981f45ba460290ec97bd424a80ed4675b12aa68e9d3426bc253c5ae63ad4deba146b69a10b8f532c40344e6194482c3cc73bc4ab95910
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1