General
-
Target
b60779fb424958088a559fdfd6f535c2.exe
-
Size
350KB
-
Sample
250228-jhsahawkz4
-
MD5
b60779fb424958088a559fdfd6f535c2
-
SHA1
bcea427b20d2f55c6372772668c1d6818c7328c9
-
SHA256
098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
-
SHA512
c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
SSDEEP
6144:eB2ofI2u6ukzPZnu3eb+JZAZBefgAvVGfvu5fp4Dcl/OMeNfsrjDM:eB2of9uNKPZnu3eqJS+fg4Q+5f2olRen
Static task
static1
Behavioral task
behavioral1
Sample
b60779fb424958088a559fdfd6f535c2.exe
Resource
win7-20240729-en
Malware Config
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
b60779fb424958088a559fdfd6f535c2.exe
-
Size
350KB
-
MD5
b60779fb424958088a559fdfd6f535c2
-
SHA1
bcea427b20d2f55c6372772668c1d6818c7328c9
-
SHA256
098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
-
SHA512
c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
SSDEEP
6144:eB2ofI2u6ukzPZnu3eb+JZAZBefgAvVGfvu5fp4Dcl/OMeNfsrjDM:eB2of9uNKPZnu3eqJS+fg4Q+5f2olRen
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4