General
-
Target
R.3.L.E.$.E-1.zip
-
Size
2.4MB
-
Sample
250420-xc8xys1yf1
-
MD5
53bbe83009cfcb949480bd34ab4bd6ee
-
SHA1
b12a44ebef54226ddd149a531b58c3caec0e4682
-
SHA256
7cef706bc97b302f19b60a3f13709abbbafa4e31644ee9b1ca88d5a02a5ebb2a
-
SHA512
7e3372ebcbbea836bc4916d1b50a9efe0a9b9c08a2ae8fbfe961820f3a2d96bcbcc6f925db65708870347aa259f8321418af5debeaff95272e6cdd99733adf28
-
SSDEEP
49152:ob8jYt9NBqDsg4hagduhQrwlKZizCWSE8ScyXbsrEHlKyqn+8yXQLR:gy0/fP0hQHiztPpXbsrk5ALR
Static task
static1
Behavioral task
behavioral1
Sample
R.3.L.E.$.E-1.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
README.txt
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Rel3aseUi/ReleaseUi.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
vidar
13.5
eb17a39311b2fbc653bb6a88c15634e4
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Targets
-
-
Target
R.3.L.E.$.E-1.zip
-
Size
2.4MB
-
MD5
53bbe83009cfcb949480bd34ab4bd6ee
-
SHA1
b12a44ebef54226ddd149a531b58c3caec0e4682
-
SHA256
7cef706bc97b302f19b60a3f13709abbbafa4e31644ee9b1ca88d5a02a5ebb2a
-
SHA512
7e3372ebcbbea836bc4916d1b50a9efe0a9b9c08a2ae8fbfe961820f3a2d96bcbcc6f925db65708870347aa259f8321418af5debeaff95272e6cdd99733adf28
-
SSDEEP
49152:ob8jYt9NBqDsg4hagduhQrwlKZizCWSE8ScyXbsrEHlKyqn+8yXQLR:gy0/fP0hQHiztPpXbsrk5ALR
Score1/10 -
-
-
Target
README.txt
-
Size
95B
-
MD5
eb2d3b74e1a6d524bf9409757fe9f3fa
-
SHA1
258efb44fa55e7bf6436ff820f99303985956a07
-
SHA256
a882f579fe1f8d02515c4f4ca9a59bf9ba8422ad14ce99f455b2ceeea10a6432
-
SHA512
4fcfee6f946d0a23d56fe9f4c3a587a03e3bab03a40943767dfab0502d6dbca4662404710b5fb6af332b46a9093be29ad51e6a8993b9be1d99d85ed55d298959
Score1/10 -
-
-
Target
Rel3aseUi/ReleaseUi.exe
-
Size
81KB
-
MD5
41c2401a4ecf9c80796e534d388e56cd
-
SHA1
e844e6b178ef8191ce189c0e632dc7fdb2947db3
-
SHA256
0e5a768a611a4d0ed7cb984b2ee790ad419c6ce0be68c341a2d4f64c531d8122
-
SHA512
6f7d365f10b45cc88d8968020f6232974398cc1b46710bf650c5aa162c40d48fef0a035b29fc1b0271d4f69410fbca1b4a4119d816eeec205043175981429071
-
SSDEEP
1536:dEV+sOWSnk3uXcieWN8WBnc1br8zlZAHaG8CaWCMp+O7Xg5U:dEV+sFSkMxRnc1br8j0aCCMXL7
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Suspicious use of SetThreadContext
-