MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2ab0b721edb68a11acb2301cdcdf2ce11c12cb6f7b4704ea7f432010c2d23653. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 2ab0b721edb68a11acb2301cdcdf2ce11c12cb6f7b4704ea7f432010c2d23653
SHA3-384 hash: 0920f1b24f95b5b062de9197c1a42fd458b018de1654cd6698bd1d05a13bdb556fb008f25f3feaec7d2b693c18698f9b
SHA1 hash: 564cfcf5b9f7da9848c09db6f386dc73e90c8807
MD5 hash: a09ab0da22265a240c0d64d87670a2df
humanhash: social-yankee-leopard-lima
File name:VisualCode.exe
Download: download sample
Signature Vidar
File size:641'024 bytes
First seen:2025-05-06 07:05:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3e2a6ecfffc5d43a7565ef87874e92c4 (49 x LummaStealer, 13 x Vidar, 3 x Stealc)
ssdeep 12288:Tno9eLBY8cisPKZ+src3xSRNFcHxw7+t5IDecHxw7+t5ID:Tno9eS8cpPajYw7+PIDbw7+PID
Threatray 149 similar samples on MalwareBazaar
TLSH T1E5D4DF18C71199DAFE2A00B94461A211B6337D3A8B381FFF63A4D3322E537D45A3DB65
TrID 63.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe vidar

Intelligence


File Origin
# of uploads :
1
# of downloads :
447
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
injection virus crypt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
crypt microsoft_visual_cc packed packed packer_detected
Result
Threat name:
AsyncRAT, LummaC Stealer, Njrat, Quasar,
Detection:
malicious
Classification:
phis.troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates multiple autostart registry keys
Disables zone checking for all users
Drops PE files to the startup folder
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected LummaC Stealer
Yara detected Njrat
Yara detected Quasar RAT
Yara detected VenomRAT
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1681873 Sample: VisualCode.exe Startdate: 06/05/2025 Architecture: WINDOWS Score: 100 118 eczakozmetik.net 2->118 120 www.google.com 2->120 122 36 other IPs or domains 2->122 152 Suricata IDS alerts for network traffic 2->152 154 Found malware configuration 2->154 156 Malicious sample detected (through community Yara rule) 2->156 158 25 other signatures 2->158 11 VisualCode.exe 2->11         started        14 Server.exe 2->14         started        16 msedge.exe 99 627 2->16         started        19 10 other processes 2->19 signatures3 process4 dnsIp5 190 Writes to foreign memory regions 11->190 192 Allocates memory in foreign processes 11->192 194 Injects a PE file into a foreign processes 11->194 21 MSBuild.exe 39 11->21         started        196 Multi AV Scanner detection for dropped file 14->196 114 192.168.2.6 unknown unknown 16->114 116 239.255.255.250 unknown Reserved 16->116 26 msedge.exe 16->26         started        28 msedge.exe 16->28         started        30 msedge.exe 16->30         started        32 msedge.exe 16->32         started        signatures6 process7 dnsIp8 126 t.me 149.154.167.99, 443, 49692 TELEGRAMRU United Kingdom 21->126 128 66.44.4t.com 78.46.233.21, 443, 49693, 49694 HETZNER-ASDE Germany 21->128 134 2 other IPs or domains 21->134 94 C:\Users\user\AppData\Local\...\Shtray[1].exe, PE32 21->94 dropped 96 C:\Users\user\AppData\Local\...\Q_Br[1].exe, PE32 21->96 dropped 98 C:\Users\user\AppData\...\LasioSia[1].exe, PE32+ 21->98 dropped 100 7 other malicious files 21->100 dropped 182 Attempt to bypass Chrome Application-Bound Encryption 21->182 184 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 21->184 186 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 21->186 188 7 other signatures 21->188 34 9rqqimg479.exe 21->34         started        38 s00zcjwlfk.exe 21->38         started        40 euk6p89zcb.exe 21->40         started        42 5 other processes 21->42 130 s-part-0043.t-0009.t-msedge.net 13.107.246.71, 443, 49765 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->130 132 ax-0001.ax-msedge.net 150.171.27.10, 443, 49746 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->132 136 28 other IPs or domains 26->136 file9 signatures10 process11 dnsIp12 86 C:\Users\user\...\4W98gch5O7KaADmG.exe, PE32 34->86 dropped 160 Antivirus detection for dropped file 34->160 162 Multi AV Scanner detection for dropped file 34->162 164 Query firmware table information (likely to detect VMs) 34->164 176 3 other signatures 34->176 45 4W98gch5O7KaADmG.exe 34->45         started        88 C:\Users\user\AppData\Local\...\svchost.exe, PE32 38->88 dropped 166 Drops PE files with benign system names 38->166 49 svchost.exe 38->49         started        90 C:\Users\user\AppData\Local\...\AMD Sound.exe, PE32 40->90 dropped 168 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 40->168 51 cmd.exe 40->51         started        53 cmd.exe 40->53         started        148 192.168.2.5, 443, 4441, 49675 unknown unknown 42->148 150 192.168.2.4 unknown unknown 42->150 92 C:\Users\user\AppData\...\Jakc Driver.exe, PE32 42->92 dropped 170 Monitors registry run keys for changes 42->170 172 Writes to foreign memory regions 42->172 174 Allocates memory in foreign processes 42->174 178 2 other signatures 42->178 55 MSBuild.exe 42->55         started        58 Jakc Driver.exe 42->58         started        60 chrome.exe 42->60         started        62 5 other processes 42->62 file13 signatures14 process15 dnsIp16 102 C:\Users\user\...\dL7jgF1pgGuXL7MM.exe, PE32 45->102 dropped 104 C:\Users\user\...\aOfZPX7F359UC4WH.exe, PE32 45->104 dropped 106 C:\Users\user\...\rPpLsQbR8oLN188p.exe, PE32+ 45->106 dropped 108 C:\Users\user\AppData\...\VavineSound[1].exe, PE32+ 45->108 dropped 198 Multi AV Scanner detection for dropped file 45->198 200 Query firmware table information (likely to detect VMs) 45->200 202 Tries to detect sandboxes and other dynamic analysis tools (window names) 45->202 214 3 other signatures 45->214 110 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 49->110 dropped 112 C:\Users\user\AppData\Local\Temp\Server.exe, PE32 49->112 dropped 204 System process connects to network (likely due to code injection or exploit) 49->204 206 Disables zone checking for all users 49->206 208 Creates multiple autostart registry keys 49->208 216 2 other signatures 49->216 64 schtasks.exe 49->64         started        66 AMD Sound.exe 51->66         started        70 conhost.exe 51->70         started        72 timeout.exe 51->72         started        210 Uses schtasks.exe or at.exe to add and modify task schedules 53->210 74 conhost.exe 53->74         started        76 schtasks.exe 53->76         started        138 eczakozmetik.net 104.21.91.28, 443, 49795, 49797 CLOUDFLARENETUS United States 55->138 140 ipwho.is 108.181.47.111 ASN852CA Canada 58->140 212 Hides that the sample has been downloaded from the Internet (zone.identifier) 58->212 78 schtasks.exe 58->78         started        142 ogads-pa.clients6.google.com 142.250.69.10, 443, 49718, 49720 GOOGLEUS United States 60->142 144 www.google.com 192.178.49.164, 443, 49709, 49710 GOOGLEUS United States 60->144 146 3 other IPs or domains 60->146 80 conhost.exe 62->80         started        file17 signatures18 process19 dnsIp20 82 conhost.exe 64->82         started        124 94.26.90.81, 4441, 49800, 5437 ASDETUKhttpwwwheficedcomGB Bulgaria 66->124 180 Tries to detect sandboxes / dynamic malware analysis system (Installed program check) 66->180 84 conhost.exe 78->84         started        signatures21 process22
Threat name:
Win64.Trojan.Vidar
Status:
Malicious
First seen:
2025-05-06 01:00:50 UTC
File Type:
PE+ (Exe)
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:lumma family:njrat family:quasar family:vidar botnet:158fdd2a4f5abb978509580715e5353f botnet:default botnet:edge botnet:user credential_access defense_evasion discovery persistence rat spyware stealer themida trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Executes dropped EXE
Themida packer
Unsecured Credentials: Credentials In Files
Downloads MZ/PE file
Uses browser remote debugging
Async RAT payload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
AsyncRat
Asyncrat family
Detect Vidar Stealer
Lumma Stealer, LummaC
Lumma family
Njrat family
Quasar RAT
Quasar family
Quasar payload
Vidar
Vidar family
njRAT/Bladabindi
Malware Config
C2 Extraction:
https://t.me/m00f3r
https://steamcommunity.com/profiles/76561199851454339
94.26.90.81:7773
94.26.90.81:4441
https://eczakozmetik.net/qop
https://orjinalecza.net/lxaz
https://orijinalecza.org/jub
https://ktortoisgfe.top/paxk
https://eczamedikal.org/vax
https://orijinalecza.net/kazd
https://medicalbitkisel.net/juj
https://snakejh.top/adsk
94.26.90.81:5437
Verdict:
Suspicious
Tags:
stealc
YARA:
n/a
Unpacked files
SH256 hash:
2ab0b721edb68a11acb2301cdcdf2ce11c12cb6f7b4704ea7f432010c2d23653
MD5 hash:
a09ab0da22265a240c0d64d87670a2df
SHA1 hash:
564cfcf5b9f7da9848c09db6f386dc73e90c8807
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe 2ab0b721edb68a11acb2301cdcdf2ce11c12cb6f7b4704ea7f432010c2d23653

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileW

Comments