MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ac4f13534743be2ae855a33db85ef60221cc8b69303c8ebbd42af8a6c42cd8c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 15


Intelligence 15 IOCs YARA 20 File information Comments

SHA256 hash: 1ac4f13534743be2ae855a33db85ef60221cc8b69303c8ebbd42af8a6c42cd8c
SHA3-384 hash: 48a690bf2f9e4f826edca44aa217b43802f4d67d7d60622637b9b7e8109ace577fe6bece8eab86eb11dc621c78902f47
SHA1 hash: 50647f397b12d42d8ea58f6a6270d84671df5645
MD5 hash: 93a1b2c01b2964a8a8110e93a97548b4
humanhash: march-moon-whiskey-quebec
File name:IDMAN6~1.EXE
Download: download sample
Signature Vidar
File size:12'295'264 bytes
First seen:2025-12-23 16:57:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9cbefe68f395e67356e2a5d8d1b285c0 (58 x LummaStealer, 49 x AuroraStealer, 37 x Vidar)
ssdeep 49152:0Q6PXmDllrb/T0vO90d7HjmAFd4A64nsfJMBq+AQrNKtpMdTuV5dHJM/5+0zX8Mb:ptoBq+tWqSb+MMXFH5yU4BDGerof
TLSH T1FCC68D09EC240674C5A9827056F304D99E3ABDD53B501AF726BD7ABD0F235C46ABE2CC
gimphash a86e5e6f244194b39d2b73177a129e924dc9dc4433f2a6fbc9ace9301a575e7f
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter aachum
Tags:178-22-24-175 exe VenomRAT vidar


Avatar
iamaachum
https://downloadtorrentfile.com/hash/5ab4176a2d094f3d361705e2c23be3afabdb4ee2?name=Internet%20Download%20Manager%20%28IDM%29%20v6.42%20Build%2042%20%2b%20Fix%7bCracksHash%7d

VenomRAT C2: 178.22.24.175:4449
Vidar C2:
https://telegram.me/gal17d
https://steamcommunity.com/profiles/76561198759765485
https://xet.multiatend.com.br/

Intelligence


File Origin
# of uploads :
1
# of downloads :
78
Origin country :
FR FR
Vendor Threat Intelligence
Malware configuration found for:
Going VenomRAT
Details
Going
a sub-decoded component
VenomRAT
c2 socket addresses, a mutex, a missionid, a version, filepaths, a server signature, an X509 certificate, and possibly CryptoCurrency addresses
Malware family:
asyncrat
ID:
1
File name:
IDMAN61.EXE
Verdict:
Malicious activity
Analysis date:
2025-12-23 16:49:16 UTC
Tags:
golang auto-reg pastebin generic stealer stormkitty asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
extens sage blic
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-12-23T13:58:00Z UTC
Last seen:
2025-12-23T14:15:00Z UTC
Hits:
~10
Detections:
Trojan-PSW.MSIL.Stealerium.sb Trojan-PSW.MSIL.Stealer.sb Trojan-PSW.MSIL.Agent.sb Backdoor.MSIL.Crysan.sb Trojan-PSW.Win32.Coins.sb Trojan.MSIL.DInvoke.sb Trojan.MSIL.Agent.sb HEUR:Trojan-PSW.MSIL.Stealerium.pef Exploit.Win32.BypassUAC.sb Backdoor.MSIL.VenomRAT.a Backdoor.MSIL.Crysan.c
Result
Threat name:
DcRat, Gocoder, KeyLogger, StormKitty, V
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates autostart registry keys with suspicious names
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Protects its processes via BreakOnTermination flag
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected BrowserPasswordDump
Yara detected DcRat
Yara detected Gocoder ransomware
Yara detected StormKitty Stealer
Yara detected VenomRAT
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838323 Sample: IDMAN6#U007e1.EXE.exe Startdate: 23/12/2025 Architecture: WINDOWS Score: 100 109 pastebin.com 2->109 111 bg.microsoft.map.fastly.net 2->111 117 Suricata IDS alerts for network traffic 2->117 119 Found malware configuration 2->119 121 Malicious sample detected (through community Yara rule) 2->121 125 13 other signatures 2->125 14 IDMAN6#U007e1.EXE.exe 1 2->14         started        18 IDMAN6#U007e1.EXE.exe 2->18         started        20 IDMAN6#U007e1.EXE.exe 2->20         started        22 2 other processes 2->22 signatures3 123 Connects to a pastebin service (likely for C&C) 109->123 process4 file5 91 C:\Users\user\...\IDMAN6#U007e1.EXE.exe, PE32+ 14->91 dropped 139 Drops PE files to the document folder of the user 14->139 141 Found many strings related to Crypto-Wallets (likely being stolen) 14->141 143 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->143 147 3 other signatures 14->147 24 AppLaunch.exe 16 6 14->24         started        29 cmd.exe 1 14->29         started        145 Multi AV Scanner detection for dropped file 18->145 signatures6 process7 dnsIp8 113 178.22.24.175, 4449, 49697 CLEVERNETWORK-ASNFR Switzerland 24->113 115 pastebin.com 172.66.171.73, 443, 49696 CLOUDFLARENETUS United States 24->115 83 C:\Users\...\executive_7839.858_INSTALL.exe, PE32 24->83 dropped 85 C:\...\Cross-platform_25.49.22_INSTALL.exe, PE32 24->85 dropped 135 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->135 137 Protects its processes via BreakOnTermination flag 24->137 31 cmd.exe 1 24->31         started        34 cmd.exe 24->34         started        36 reg.exe 1 1 29->36         started        38 conhost.exe 29->38         started        file9 signatures10 process11 signatures12 149 Suspicious powershell command line found 31->149 151 Bypasses PowerShell execution policy 31->151 40 powershell.exe 12 31->40         started        42 conhost.exe 31->42         started        44 powershell.exe 34->44         started        46 conhost.exe 34->46         started        153 Creates autostart registry keys with suspicious names 36->153 process13 process14 48 executive_7839.858_INSTALL.exe 2 40->48         started        51 Cross-platform_25.49.22_INSTALL.exe 44->51         started        file15 71 C:\Users\...\executive_7839.858_INSTALL.tmp, PE32 48->71 dropped 53 executive_7839.858_INSTALL.tmp 3 5 48->53         started        73 C:\...\Cross-platform_25.49.22_INSTALL.tmp, PE32 51->73 dropped 56 Cross-platform_25.49.22_INSTALL.tmp 51->56         started        process16 file17 75 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 53->75 dropped 77 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 53->77 dropped 58 executive_7839.858_INSTALL.exe 2 53->58         started        79 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 56->79 dropped 81 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 56->81 dropped 61 Cross-platform_25.49.22_INSTALL.exe 56->61         started        process18 file19 87 C:\Users\...\executive_7839.858_INSTALL.tmp, PE32 58->87 dropped 63 executive_7839.858_INSTALL.tmp 5 16 58->63         started        89 C:\...\Cross-platform_25.49.22_INSTALL.tmp, PE32 61->89 dropped 66 Cross-platform_25.49.22_INSTALL.tmp 61->66         started        process20 file21 93 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 63->93 dropped 95 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 63->95 dropped 97 C:\ProgramData\...\vcruntime140_1.dll (copy), PE32+ 63->97 dropped 105 11 other malicious files 63->105 dropped 68 FnHotkeyUtility.exe 63->68         started        99 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 66->99 dropped 101 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 66->101 dropped 103 C:\ProgramData\...\msvcp140.dll (copy), PE32 66->103 dropped 107 6 other malicious files 66->107 dropped process22 signatures23 127 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 68->127 129 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 68->129 131 Found direct / indirect Syscall (likely to bypass EDR) 68->131 133 Potentially malicious time measurement code found 68->133
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Kepavll
Status:
Malicious
First seen:
2025-12-23 16:49:17 UTC
File Type:
PE+ (Exe)
Extracted files:
8
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:asyncrat family:stormkitty defense_evasion discovery execution installer persistence rat spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Command and Scripting Interpreter: PowerShell
Suspicious use of SetThreadContext
UPX packed file
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
ACProtect 1.3x - 1.4x DLL software
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AsyncRat
Asyncrat family
StormKitty
StormKitty payload
Stormkitty family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
1ac4f13534743be2ae855a33db85ef60221cc8b69303c8ebbd42af8a6c42cd8c
MD5 hash:
93a1b2c01b2964a8a8110e93a97548b4
SHA1 hash:
50647f397b12d42d8ea58f6a6270d84671df5645
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:golang_duffcopy_amd64
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Suspicious_Golang_Binary
Author:Tim Machac
Description:Triage: Golang-compiled binary with suspicious OS/persistence/network strings (not family-specific)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe 1ac4f13534743be2ae855a33db85ef60221cc8b69303c8ebbd42af8a6c42cd8c

(this sample)

Comments