MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 159d98362df9853029651ed00cc363dbada760b2427150ffa23e7827e205b882. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 159d98362df9853029651ed00cc363dbada760b2427150ffa23e7827e205b882
SHA3-384 hash: 37a391135dbbacd9ca02a07bafaf45b5822273f3ae5a0d7c6c87faba39386bc3aba4859395b881e69f4febaf6b333046
SHA1 hash: 75404e49bda38131263d9248680f00095a2c7c10
MD5 hash: 532c1c8d138de39ab85eab26d237e864
humanhash: five-william-fillet-california
File name:532c1c8d138de39ab85eab26d237e864
Download: download sample
Signature Vidar
File size:632'320 bytes
First seen:2023-04-12 12:43:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 3072:LOhX0N7+f1E5FX4gjCO99PmzBxWkUDOmEORLOtLBCFTH9Vxr:ShEN7+W4gh99O+kU6JOJkITHp
Threatray 623 similar samples on MalwareBazaar
TLSH T123D468C27785D063EC430A704E9793DA972DFDE0EE6031636721F74E0A7AAE26E61315
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 00f0cccececed000 (1 x Vidar)
Reporter abuse_ch
Tags:exe vidar

Intelligence


File Origin
# of uploads :
1
# of downloads :
254
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
532c1c8d138de39ab85eab26d237e864
Verdict:
Malicious activity
Analysis date:
2023-04-12 12:45:12 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Launching a process
Creating a file
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
86%
Tags:
advpack.dll CAB hacktool installer large-file packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 845451 Sample: TnhvNh3ZQm.exe Startdate: 12/04/2023 Architecture: WINDOWS Score: 100 35 Malicious sample detected (through community Yara rule) 2->35 37 Yara detected Vidar stealer 2->37 39 C2 URLs / IPs found in malware configuration 2->39 41 Found many strings related to Crypto-Wallets (likely being stolen) 2->41 8 TnhvNh3ZQm.exe 1 3 2->8         started        11 rundll32.exe 2->11         started        process3 file4 27 C:\Users\user\AppData\Local\...\knowleovl.exe, PE32 8->27 dropped 13 knowleovl.exe 15 4 8->13         started        process5 dnsIp6 33 cistechnical.com 192.185.235.142, 443, 49706 UNIFIEDLAYER-AS-1US United States 13->33 49 Antivirus detection for dropped file 13->49 51 Encrypted powershell cmdline option found 13->51 53 Writes to foreign memory regions 13->53 55 2 other signatures 13->55 17 AppLaunch.exe 16 13->17         started        21 powershell.exe 14 13->21         started        signatures7 process8 dnsIp9 29 t.me 149.154.167.99, 443, 49707 TELEGRAMRU United Kingdom 17->29 31 195.201.44.70, 49708, 80 HETZNER-ASDE Germany 17->31 43 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->43 45 Tries to harvest and steal browser information (history, passwords, etc) 17->45 47 Tries to steal Crypto Currency Wallets 17->47 23 WerFault.exe 23 9 17->23         started        25 conhost.exe 21->25         started        signatures10 process11
Threat name:
Win32.Trojan.Casdet
Status:
Malicious
First seen:
2023-04-12 13:06:57 UTC
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:0e17f083173cc2ea34d9ec9eba45b33f persistence spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Vidar
Malware Config
C2 Extraction:
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
Unpacked files
SH256 hash:
159d98362df9853029651ed00cc363dbada760b2427150ffa23e7827e205b882
MD5 hash:
532c1c8d138de39ab85eab26d237e864
SHA1 hash:
75404e49bda38131263d9248680f00095a2c7c10
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments