MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 050c18a4c4d3144768bbab6026fdb29882237ac77a251bb9b40241174a08396d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments

SHA256 hash: 050c18a4c4d3144768bbab6026fdb29882237ac77a251bb9b40241174a08396d
SHA3-384 hash: 6d85af9c623e710067628d71917a00512b5cc18432e322d7924e4c9ef2f6a943045fe21e8cc1adaf7844b07192a77c2b
SHA1 hash: d625addd3a5c6b7c541e27a2d619b071297a4405
MD5 hash: 94c5093d15971dee7f61b16db9be11d9
humanhash: washington-utah-triple-winner
File name:C0akWBF.exe
Download: download sample
Signature Vidar
File size:882'688 bytes
First seen:2025-06-16 12:55:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8035424c0cddf72a240c7dfefe26c35f (14 x LummaStealer, 2 x ResolverRAT, 2 x Vidar)
ssdeep 24576:JGdrP0Gpf+xkfYZnz1tOlTuH/KWZsrLtkoFQVY5S+BJ:tGlHwZqUHvseo8mS+BJ
TLSH T1F815AF3AA25261EAED1680B70551A151F9A3F93287382FFF0390D3321E07BC95F6D769
TrID 63.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe vidar

Intelligence


File Origin
# of uploads :
1
# of downloads :
483
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
f41a63e819e05bba77cd95e8e95136aa.exe
Verdict:
Malicious activity
Analysis date:
2025-06-16 12:30:55 UTC
Tags:
loader amadey botnet stealer lumma rdp auto-reg themida gcleaner evasion telegram rat remcos remote smokeloader netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
virus crypt zusy
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a system process
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Suspicious execution chain found
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Powershell decode and execute
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1715516 Sample: C0akWBF.exe Startdate: 16/06/2025 Architecture: WINDOWS Score: 100 89 t.me 2->89 91 r.msftstatic.com 2->91 93 32 other IPs or domains 2->93 117 Suricata IDS alerts for network traffic 2->117 119 Malicious sample detected (through community Yara rule) 2->119 121 Multi AV Scanner detection for submitted file 2->121 123 7 other signatures 2->123 10 C0akWBF.exe 1 2->10         started        13 svchost.exe 2->13         started        signatures3 process4 dnsIp5 135 Writes to foreign memory regions 10->135 137 Allocates memory in foreign processes 10->137 139 Injects a PE file into a foreign processes 10->139 16 MSBuild.exe 45 10->16         started        20 MSBuild.exe 10->20         started        22 conhost.exe 10->22         started        107 127.0.0.1 unknown unknown 13->107 signatures6 process7 dnsIp8 83 t.me 149.154.167.99, 443, 49683 TELEGRAMRU United Kingdom 16->83 85 19.171.learnblockchain101.com 49.12.119.95, 443, 49684, 49685 HETZNER-ASDE Germany 16->85 109 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->109 111 Encrypted powershell cmdline option found 16->111 113 Tries to harvest and steal ftp login credentials 16->113 115 3 other signatures 16->115 24 powershell.exe 22 16->24         started        28 powershell.exe 16->28         started        30 chrome.exe 16->30         started        32 27 other processes 16->32 signatures9 process10 dnsIp11 79 C:\Users\user\AppData\...\bewlhcfu.cmdline, Unicode 24->79 dropped 125 Writes to foreign memory regions 24->125 127 Compiles code for process injection (via .Net compiler) 24->127 129 Creates a thread in another existing process (thread injection) 24->129 35 csc.exe 3 24->35         started        38 conhost.exe 24->38         started        81 C:\Users\user\AppData\Local\...\r3tczmub.0.cs, Unicode 28->81 dropped 40 conhost.exe 28->40         started        131 Encrypted powershell cmdline option found 30->131 133 Suspicious execution chain found 30->133 87 192.168.2.9, 138, 443, 49157 unknown unknown 32->87 42 chrome.exe 32->42         started        45 csc.exe 32->45         started        47 csc.exe 32->47         started        49 25 other processes 32->49 file12 signatures13 process14 dnsIp15 65 C:\Users\user\AppData\Local\...\bewlhcfu.dll, PE32 35->65 dropped 51 cvtres.exe 1 35->51         started        95 apis.google.com 42->95 97 ogads-pa.clients6.google.com 142.250.80.74, 443, 49707, 49709 GOOGLEUS United States 42->97 103 4 other IPs or domains 42->103 67 C:\Users\user\AppData\Local\...\dzhek1bp.dll, PE32 45->67 dropped 53 cvtres.exe 45->53         started        69 C:\Users\user\AppData\Local\...\dowmetnr.dll, PE32 47->69 dropped 55 cvtres.exe 47->55         started        99 142.250.65.196, 443, 49722, 49723 GOOGLEUS United States 49->99 101 142.250.65.234, 443, 49733, 49734 GOOGLEUS United States 49->101 105 2 other IPs or domains 49->105 71 C:\Users\user\AppData\Local\...\xopm213l.dll, PE32 49->71 dropped 73 C:\Users\user\AppData\Local\...\vq1l250q.dll, PE32 49->73 dropped 75 C:\Users\user\AppData\Local\...\uayhmuny.dll, PE32 49->75 dropped 77 8 other files (none is malicious) 49->77 dropped 57 cvtres.exe 49->57         started        59 cvtres.exe 49->59         started        61 cvtres.exe 49->61         started        63 7 other processes 49->63 file16 process17
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-06-16 06:17:12 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:28d588a22648b16835dc771b6f76b223 credential_access defense_evasion discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Obfuscated Files or Information: Command Obfuscation
Unsecured Credentials: Credentials In Files
Uses browser remote debugging
Detect Vidar Stealer
Vidar
Vidar family
Malware Config
C2 Extraction:
https://t.me/gu77xt
https://steamcommunity.com/profiles/76561199863931286
Verdict:
Malicious
Tags:
Win.Packed.Agen-10045323-0 stealc
YARA:
n/a
Unpacked files
SH256 hash:
050c18a4c4d3144768bbab6026fdb29882237ac77a251bb9b40241174a08396d
MD5 hash:
94c5093d15971dee7f61b16db9be11d9
SHA1 hash:
d625addd3a5c6b7c541e27a2d619b071297a4405
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe 050c18a4c4d3144768bbab6026fdb29882237ac77a251bb9b40241174a08396d

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThreadpoolWork
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW

Comments