General
-
Target
Application_x32_x64_Setup.rar
-
Size
116.7MB
-
Sample
250303-cc6sdasr19
-
MD5
6f9d81fabb624fb12b4cab01e112a934
-
SHA1
918f6c2b15f15a20aa7c3653daee727b0f95e065
-
SHA256
78dcdac4b4816f6e692a311964f26cb56008cddd4d737e4e1f9219d1e2268d7b
-
SHA512
2c5fdf3421fca82ba8e6eafc29f0cb785e5351f6c3d9f33e2437f4481a5c934ea315592d87fc07e270b0d328cb4938f12f1409a483a80014bb97e4ca6b8773c6
-
SSDEEP
3145728:k9V7tlK02gSAogXNri1xIzJVIQ8qjS1sUUS+DcIO:ybK0+A9BikXtiCScS
Static task
static1
Malware Config
Extracted
https://yaykisobakitop.top/kjlrfejkrfkrerfk3fkfrkerlkfr3ejhkRKFJKERKJFREWKJ34JK34JKDWK/lica
https://yaykisobakitop.top/kjlrfejkrfkrerfk3fkfrkerlkfr3ejhkRKFJKERKJFREWKJ34JK34JKDWK/lica
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
Application_x32_x64_Setup.rar
-
Size
116.7MB
-
MD5
6f9d81fabb624fb12b4cab01e112a934
-
SHA1
918f6c2b15f15a20aa7c3653daee727b0f95e065
-
SHA256
78dcdac4b4816f6e692a311964f26cb56008cddd4d737e4e1f9219d1e2268d7b
-
SHA512
2c5fdf3421fca82ba8e6eafc29f0cb785e5351f6c3d9f33e2437f4481a5c934ea315592d87fc07e270b0d328cb4938f12f1409a483a80014bb97e4ca6b8773c6
-
SSDEEP
3145728:k9V7tlK02gSAogXNri1xIzJVIQ8qjS1sUUS+DcIO:ybK0+A9BikXtiCScS
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4