General
-
Target
2025-04-18_064e51084b64d71b80d70894ab511246_cobalt-strike
-
Size
1.7MB
-
Sample
250418-2cgwpawzcx
-
MD5
064e51084b64d71b80d70894ab511246
-
SHA1
80a04ee1a2c62e4a312fb9387508c3d08d700ecd
-
SHA256
0921b5c74e073c331a8ba6396e8ffe3d90486d7cec0b54dd8801112e33cdb177
-
SHA512
fcc27c0a60c955c7feea8ba757a148d189a44e90e512f57bb5b8e9e0ba1b6e200cb39d9a0609de0cea1959e5d4df36f30ee6ce1ccb2b601bb860e53a5bfb6004
-
SSDEEP
24576:6rloDyu6xW3AQpF0Fyrjw83M2HlA7Izl+63FZZ:oMyC3AQCyrjw88v7Izl+63F3
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-18_064e51084b64d71b80d70894ab511246_cobalt-strike.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-18_064e51084b64d71b80d70894ab511246_cobalt-strike.exe
Resource
win11-20250410-en
Malware Config
Extracted
vidar
13.5
eb17a39311b2fbc653bb6a88c15634e4
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Targets
-
-
Target
2025-04-18_064e51084b64d71b80d70894ab511246_cobalt-strike
-
Size
1.7MB
-
MD5
064e51084b64d71b80d70894ab511246
-
SHA1
80a04ee1a2c62e4a312fb9387508c3d08d700ecd
-
SHA256
0921b5c74e073c331a8ba6396e8ffe3d90486d7cec0b54dd8801112e33cdb177
-
SHA512
fcc27c0a60c955c7feea8ba757a148d189a44e90e512f57bb5b8e9e0ba1b6e200cb39d9a0609de0cea1959e5d4df36f30ee6ce1ccb2b601bb860e53a5bfb6004
-
SSDEEP
24576:6rloDyu6xW3AQpF0Fyrjw83M2HlA7Izl+63FZZ:oMyC3AQCyrjw88v7Izl+63F3
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2