General
-
Target
Setup.exe
-
Size
131KB
-
Sample
250216-p8kagayjcr
-
MD5
2dfce881ad2ca0ca30c5ed6a92230b3f
-
SHA1
c6792769d515fe768c4b81b123127cb0a08bd4ce
-
SHA256
230d14997dbfa46128e59c5e2b54f542adb297b1b034f740078fb8d8c03d3df8
-
SHA512
90c54deefd38e9c3c581bf504cc9db986526551690f983ff9d6a5caaa16d19d9d69143ab878a9cc95087851a26b537f3893f503b025d6024f4bcea58e18fc889
-
SSDEEP
3072:uTOaWIM8/sjX/6jrvDmCIsqIAOb84vOyHAqbsmghhL:NIM80jXSfbqG8QOCbsphL
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win11-20250211-en
Malware Config
Extracted
vidar
https://t.me/b4cha00
https://steamcommunity.com/profiles/76561199825403037
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0
Targets
-
-
Target
Setup.exe
-
Size
131KB
-
MD5
2dfce881ad2ca0ca30c5ed6a92230b3f
-
SHA1
c6792769d515fe768c4b81b123127cb0a08bd4ce
-
SHA256
230d14997dbfa46128e59c5e2b54f542adb297b1b034f740078fb8d8c03d3df8
-
SHA512
90c54deefd38e9c3c581bf504cc9db986526551690f983ff9d6a5caaa16d19d9d69143ab878a9cc95087851a26b537f3893f503b025d6024f4bcea58e18fc889
-
SSDEEP
3072:uTOaWIM8/sjX/6jrvDmCIsqIAOb84vOyHAqbsmghhL:NIM80jXSfbqG8QOCbsphL
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1