General
-
Target
second1111.png
-
Size
2.4MB
-
Sample
250213-w6bnwa1pfk
-
MD5
f2423a37c39b9c8f3ece38fcc079f38b
-
SHA1
77d3111ce2d3704cf59acd756082cd08870dddba
-
SHA256
b46bd97ddb34e9cda43e4d554d9f3d9ece02d34fa5a255a6d28ed4f3c41cbaec
-
SHA512
e093a37032ddce3d00ddf4822656872157365fa86541289800160c2876f3eddaed2e5789bb60b4fddbe60964228972b9519472ca1b4d5f3148fac8d6e257c9c5
-
SSDEEP
49152:XFIf8Ijk8sDAMQ65MKSsVlOxAPB6HvmMiqkkB/rmfw3fVA/2uBAdd4h:XMjk8uFQFsV4x+BsviqkkBifwv2/BAda
Static task
static1
Behavioral task
behavioral1
Sample
second1111.png
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
second1111.png
Resource
win10v2004-20250211-en
Malware Config
Extracted
vidar
https://t.me/b4cha00
https://steamcommunity.com/profiles/76561199825403037
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0
Targets
-
-
Target
second1111.png
-
Size
2.4MB
-
MD5
f2423a37c39b9c8f3ece38fcc079f38b
-
SHA1
77d3111ce2d3704cf59acd756082cd08870dddba
-
SHA256
b46bd97ddb34e9cda43e4d554d9f3d9ece02d34fa5a255a6d28ed4f3c41cbaec
-
SHA512
e093a37032ddce3d00ddf4822656872157365fa86541289800160c2876f3eddaed2e5789bb60b4fddbe60964228972b9519472ca1b4d5f3148fac8d6e257c9c5
-
SSDEEP
49152:XFIf8Ijk8sDAMQ65MKSsVlOxAPB6HvmMiqkkB/rmfw3fVA/2uBAdd4h:XMjk8uFQFsV4x+BsviqkkBifwv2/BAda
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1