MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2b64b187c3f36ebcfeb40e5f975d923167d4e981cae7f4e2861611d1e1ae036d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Vidar
Vendor detections: 13
| SHA256 hash: | 2b64b187c3f36ebcfeb40e5f975d923167d4e981cae7f4e2861611d1e1ae036d |
|---|---|
| SHA3-384 hash: | e9a5f3f13589b0f7d03628f40c480a205f6c7ab901fa773693cd05be4bb024d08746b53c357bc409da3241e21d16de89 |
| SHA1 hash: | e90ecc19febcd61dd7552d1608e4d92a3e4f3e21 |
| MD5 hash: | 9f1189bd43c11689e6ebab461e9971ec |
| humanhash: | nine-king-timing-kilo |
| File name: | file |
| Download: | download sample |
| Signature | Vidar |
| File size: | 263'680 bytes |
| First seen: | 2023-11-19 14:47:04 UTC |
| Last seen: | 2023-11-19 15:26:38 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | eb2b7f9c7e630bef5e1bf00f3d34e673 (3 x Stealc, 2 x Smoke Loader, 1 x Vidar) |
| ssdeep | 3072:GP5wGHknHZ3dmS7D/O4n88oN5k//JctVXRBzc8oPN7ovbDh9ju:sQ53dmO/toN5ntdYMr |
| TLSH | T1F8449D1339E0BC72C46A83744F2DDAECBB6E74610D65875B27181E6A0DF02B1D7AB316 |
| TrID | 45.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.4% (.EXE) Win64 Executable (generic) (10523/12/4) 9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.6% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0008284c0e030600 (1 x Vidar) |
| Reporter | |
| Tags: | exe vidar |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
82c275cb45227b5f3b3d6b222a1e1b4a52f37d0de58655fd8daaa71efc4e0d1b
72363354fdb8847c45c1dc44e2a87a20da0fa04d52c2afddd24f8050a260b99b
a50880d6cbbc39560c99a3999e2b1fd0df3f0d5855a0f638a27489747a7f8877
bc182c1ad875034766bf6f30db48ccd680a19757d51c21624d40c29f8609eb9f
2b64b187c3f36ebcfeb40e5f975d923167d4e981cae7f4e2861611d1e1ae036d
44f7e32d9d153692bf8e985566a42e118711c5c7c458354d9d2b8da8d3ecb34d
3d6f60107b831b2c10f7788c2c47f9ca6c3804b42f83e77c6e5e9993b7392378
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.