General
-
Target
Setup.exe
-
Size
131KB
-
Sample
250220-sfe2tsxmgq
-
MD5
abf2df1aba1a934b229a5c6c26954414
-
SHA1
18ee222087a4f65366a24df3998f17e760ad7aa2
-
SHA256
29c88d185c4c1bee7944a0dc0a53bb5809eba3691b147a8361300b5a2572e350
-
SHA512
ec19194c5ee91d59c3681f50ffd0b7a8afe1dd65b835418f136e9b4185465b16bb286ed60d77f816421c4d4af80806576dbce351a224975e63ed1ce10cdb280d
-
SSDEEP
3072:/dK22H8N0c2rPy+nm493gs39GgFNTIGHSxYld4RTV82Sq0:168mPD93ga7yeSgq0
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win11-20250217-en
Malware Config
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
Setup.exe
-
Size
131KB
-
MD5
abf2df1aba1a934b229a5c6c26954414
-
SHA1
18ee222087a4f65366a24df3998f17e760ad7aa2
-
SHA256
29c88d185c4c1bee7944a0dc0a53bb5809eba3691b147a8361300b5a2572e350
-
SHA512
ec19194c5ee91d59c3681f50ffd0b7a8afe1dd65b835418f136e9b4185465b16bb286ed60d77f816421c4d4af80806576dbce351a224975e63ed1ce10cdb280d
-
SSDEEP
3072:/dK22H8N0c2rPy+nm493gs39GgFNTIGHSxYld4RTV82Sq0:168mPD93ga7yeSgq0
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1