Resubmissions
21-02-2025 16:13
250221-tpfv6avqgl 10General
-
Target
trigger.ps1
-
Size
28B
-
Sample
250222-bhcaaawqv4
-
MD5
fbde43d916bb7ec62d1863fe3de8edbf
-
SHA1
61787be021ab6e3e9f20f759da7b4e85747a7e22
-
SHA256
f8b0d88d7094f254631363ddf906efc52ae7f71482c0c4041f07f7d069f89b43
-
SHA512
05b22324b60a44f6b757f5a1df5566872ca08ef1b82e99947ba30415cc69454ef1927de0ff7b5e7927809d62bf89896c6a9ac9377bd4ad29971f4927fdd38421
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win10ltsc2021-20250218-en
Malware Config
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
trigger.ps1
-
Size
28B
-
MD5
fbde43d916bb7ec62d1863fe3de8edbf
-
SHA1
61787be021ab6e3e9f20f759da7b4e85747a7e22
-
SHA256
f8b0d88d7094f254631363ddf906efc52ae7f71482c0c4041f07f7d069f89b43
-
SHA512
05b22324b60a44f6b757f5a1df5566872ca08ef1b82e99947ba30415cc69454ef1927de0ff7b5e7927809d62bf89896c6a9ac9377bd4ad29971f4927fdd38421
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2