General
-
Target
9e126eb3b73eeae34c46a4b3dc9dc184a19708fd2b2433302c69e6c06b3929ed.exe
-
Size
350KB
-
Sample
250303-c7pscavjx4
-
MD5
883f93ef63d8feb7a8c49be4a5d20b45
-
SHA1
005d061a08c828dca2ff501457d45f78d23cc9fe
-
SHA256
9e126eb3b73eeae34c46a4b3dc9dc184a19708fd2b2433302c69e6c06b3929ed
-
SHA512
91dea0171abec8951b638f574d7f8c500a20f8d14315a98289559939fcab23f84afaf207bc6d60c5af0675ee7717adbfc429a28c75b249c22e831342803da399
-
SSDEEP
6144:+vV1zOZ4OkTnzaZ1Avu5fp4Dcl/OMeNfsrjilvu5fp4Dcl/OMeNfsrjiX:+v3zI4OkbzaDV5f2olReNih5f2olReNf
Static task
static1
Behavioral task
behavioral1
Sample
9e126eb3b73eeae34c46a4b3dc9dc184a19708fd2b2433302c69e6c06b3929ed.exe
Resource
win7-20241010-en
Malware Config
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
9e126eb3b73eeae34c46a4b3dc9dc184a19708fd2b2433302c69e6c06b3929ed.exe
-
Size
350KB
-
MD5
883f93ef63d8feb7a8c49be4a5d20b45
-
SHA1
005d061a08c828dca2ff501457d45f78d23cc9fe
-
SHA256
9e126eb3b73eeae34c46a4b3dc9dc184a19708fd2b2433302c69e6c06b3929ed
-
SHA512
91dea0171abec8951b638f574d7f8c500a20f8d14315a98289559939fcab23f84afaf207bc6d60c5af0675ee7717adbfc429a28c75b249c22e831342803da399
-
SSDEEP
6144:+vV1zOZ4OkTnzaZ1Avu5fp4Dcl/OMeNfsrjilvu5fp4Dcl/OMeNfsrjiX:+v3zI4OkbzaDV5f2olReNih5f2olReNf
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4