General
-
Target
fakeactivator.bat
-
Size
39B
-
Sample
250227-s4xlsasmt5
-
MD5
34392c57960b21888da234493b034908
-
SHA1
ae266c1ed8ca0d32e959eefc5919ca1563bb5512
-
SHA256
5d571a9f37e1d51c74a08d2c8e0e83923b9d0324af2d30d72f4c1b6d549324fd
-
SHA512
5fe3371a85d40936715ec7179918e24b15b6b396272d1eaa737d9de0729e57fb69cc6e0e04c00464afa932846e00af2f55d691653872bea2baff22b85ae51d84
Static task
static1
Behavioral task
behavioral1
Sample
fakeactivator.bat
Resource
win7-20241023-en
Malware Config
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
fakeactivator.bat
-
Size
39B
-
MD5
34392c57960b21888da234493b034908
-
SHA1
ae266c1ed8ca0d32e959eefc5919ca1563bb5512
-
SHA256
5d571a9f37e1d51c74a08d2c8e0e83923b9d0324af2d30d72f4c1b6d549324fd
-
SHA512
5fe3371a85d40936715ec7179918e24b15b6b396272d1eaa737d9de0729e57fb69cc6e0e04c00464afa932846e00af2f55d691653872bea2baff22b85ae51d84
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4