MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2e05e4d2d7b1d6d1b1caa909037f39057c9a929e53849a0ed49e5d001afd7508. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Vidar
Vendor detections: 16
| SHA256 hash: | 2e05e4d2d7b1d6d1b1caa909037f39057c9a929e53849a0ed49e5d001afd7508 |
|---|---|
| SHA3-384 hash: | da5afe1d3a331b878900a8509b4b2601a6664f8d05da304ce38073b4c351cb80737e20f70b2d4234314c561ac7ef4ccd |
| SHA1 hash: | 0f0c4a222d79841253fb1894925588b7c60193d1 |
| MD5 hash: | f29e32326c105d763e88b9ded0d12ffc |
| humanhash: | london-nine-oven-mississippi |
| File name: | 03187999.exe |
| Download: | download sample |
| Signature | Vidar |
| File size: | 383'488 bytes |
| First seen: | 2023-05-30 07:49:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f0e10d9a96be6b734705c743979bb47c (1 x Vidar, 1 x Rhadamanthys, 1 x Stealc) |
| ssdeep | 6144:CzVhrwOhYNouYMQCk5mwvFxHgVv83I/AGV6MTS1mbj/a5:ITJYSFMQ/mGFxHgm6HS1m/M |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | T1BD845C4392A33D45E926CB729E1FE7F8771EF2508E893769121AAB1F14B02B3D163711 |
| TrID | 39.5% (.EXE) InstallShield setup (43053/19/16) 28.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 9.6% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | 6203120642124200 (1 x Vidar) |
| Reporter | |
| Tags: | vidar |
Intelligence
File Origin
# of uploads :
1
# of downloads :
123
Origin country :
DEVendor Threat Intelligence
Malware family:
arkei
ID:
1
File name:
03187999.exe
Verdict:
Malicious activity
Analysis date:
2023-05-30 07:55:34 UTC
Tags:
installer stealer arkei vidar
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Vidar
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Creating a window
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Stealing user critical data
Result
Malware family:
n/a
Score:
9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CPUID_Instruction
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2023-05-30 07:50:06 UTC
File Type:
PE (Exe)
Extracted files:
52
AV detection:
19 of 24 (79.17%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
Result
Malware family:
vidar
Score:
10/10
Tags:
family:vidar botnet:a247b760bbf343752090be1436805458 discovery spyware stealer
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Program crash
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Vidar
Malware Config
C2 Extraction:
https://t.me/task4manager
http://23.88.46.113:80
https://steamcommunity.com/profiles/76561199510444991
http://23.88.46.113:80
https://steamcommunity.com/profiles/76561199510444991
Unpacked files
SH256 hash:
7bdd65dcc0a46d5200a4a20112f6eb283d9dfcad2e39ea5dbc441f3a59abd075
MD5 hash:
2cc398afd4678620f68ce5883a094d83
SHA1 hash:
0886689ce2b2355fc788b560fc5207ed4a9a106a
Detections:
VidarStealer
Parent samples :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 hash:
2e05e4d2d7b1d6d1b1caa909037f39057c9a929e53849a0ed49e5d001afd7508
MD5 hash:
f29e32326c105d763e88b9ded0d12ffc
SHA1 hash:
0f0c4a222d79841253fb1894925588b7c60193d1
Malware family:
Vidar.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.