General
-
Target
c222e1c90ba989065e896c93031d5615.exe
-
Size
340KB
-
Sample
250228-jhttbswkz8
-
MD5
c222e1c90ba989065e896c93031d5615
-
SHA1
c19fec40d2dd015edb50f2254e1107fbeb6ed5bf
-
SHA256
d03a9053c011a1eae2c8b6561bdb60689330cd695c13fe0f614b35cb60060159
-
SHA512
e64dfccfb886bc24842e036a2b2a34ff439af7799dc294a83a7b046d9e4c98074665bd95b0d1fea2f162abd2c50a16aec63a95a0c078f047be8cc2761ae1f6c6
-
SSDEEP
6144:JH2ofI2u6ukzPZnu3eb+JZAZBefgAvVGVvu5fp4Dcl/OMeNfsEjiX:JH2of9uNKPZnu3eqJS+fg4QY5f2olReQ
Static task
static1
Behavioral task
behavioral1
Sample
c222e1c90ba989065e896c93031d5615.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
c222e1c90ba989065e896c93031d5615.exe
-
Size
340KB
-
MD5
c222e1c90ba989065e896c93031d5615
-
SHA1
c19fec40d2dd015edb50f2254e1107fbeb6ed5bf
-
SHA256
d03a9053c011a1eae2c8b6561bdb60689330cd695c13fe0f614b35cb60060159
-
SHA512
e64dfccfb886bc24842e036a2b2a34ff439af7799dc294a83a7b046d9e4c98074665bd95b0d1fea2f162abd2c50a16aec63a95a0c078f047be8cc2761ae1f6c6
-
SSDEEP
6144:JH2ofI2u6ukzPZnu3eb+JZAZBefgAvVGVvu5fp4Dcl/OMeNfsEjiX:JH2of9uNKPZnu3eqJS+fg4QY5f2olReQ
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4