Resubmissions
27/02/2025, 15:01
250227-sdwxka1n14 10General
-
Target
no.bat
-
Size
48B
-
Sample
250227-sdwxka1n14
-
MD5
f00c051e919970a05899ac34c163a31b
-
SHA1
b8c4239ed4c0b782bd114a494e86d3b1a07d2b30
-
SHA256
515af711a6f5dbd58b170eaf34be1cc717801bb32025afdc0a63c9986e7253cc
-
SHA512
aa38b32277aa672a22a80b38dd571cbd1d1591620477a902c9122b390b68802b87c513f8248ab81b7658c81abc77ffd86235d7e8ca87083dc6200e41b6608ebb
Static task
static1
Malware Config
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
no.bat
-
Size
48B
-
MD5
f00c051e919970a05899ac34c163a31b
-
SHA1
b8c4239ed4c0b782bd114a494e86d3b1a07d2b30
-
SHA256
515af711a6f5dbd58b170eaf34be1cc717801bb32025afdc0a63c9986e7253cc
-
SHA512
aa38b32277aa672a22a80b38dd571cbd1d1591620477a902c9122b390b68802b87c513f8248ab81b7658c81abc77ffd86235d7e8ca87083dc6200e41b6608ebb
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4