General
-
Target
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e.unknown
-
Size
131KB
-
Sample
250220-fap9dswqhv
-
MD5
54fbe16bb5ff1ed4ef9ecdbfb97905ca
-
SHA1
f71d316766bd20b975c0b67d423e05d53fc59b93
-
SHA256
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e
-
SHA512
585a182fba0de848fa58d2243ddb6a27e9cea319728f1386b65f0f6baf398b88b1ec0274018604955db3b592ffbed3a61603b48f4c03ff975428476883cd57ca
-
SSDEEP
3072:U1I6D5sqVQ0p0qZAmJHeo6oTBUPn3m7oUQRDKzn6uIr352hiNY:X65zbp/imJ+o6oTBim7oUQR+6hp2v
Static task
static1
Behavioral task
behavioral1
Sample
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e.ps1
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e.unknown
-
Size
131KB
-
MD5
54fbe16bb5ff1ed4ef9ecdbfb97905ca
-
SHA1
f71d316766bd20b975c0b67d423e05d53fc59b93
-
SHA256
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e
-
SHA512
585a182fba0de848fa58d2243ddb6a27e9cea319728f1386b65f0f6baf398b88b1ec0274018604955db3b592ffbed3a61603b48f4c03ff975428476883cd57ca
-
SSDEEP
3072:U1I6D5sqVQ0p0qZAmJHeo6oTBUPn3m7oUQRDKzn6uIr352hiNY:X65zbp/imJ+o6oTBim7oUQR+6hp2v
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1