MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c87c17ae4e8ef7d193b41f48616aef4d95bdc871a0ac81e5c02ab97d5373079. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 12


Intelligence 12 IOCs YARA 22 File information Comments

SHA256 hash: 3c87c17ae4e8ef7d193b41f48616aef4d95bdc871a0ac81e5c02ab97d5373079
SHA3-384 hash: 656d01a6bd0bfcce6d29573492937a50ca1daf44c6ac643699e4e09cdaa92175f9757403bfadadbca2bb44cb1c36b8f2
SHA1 hash: 022e6add1502d7dfac7185ec3aa4602a9291a154
MD5 hash: 57b70694ac6549065a8ad3eb1e934b3b
humanhash: north-high-carbon-sixteen
File name:source code of carbanak backdoor discovered.exe
Download: download sample
Signature Vidar
File size:1'996'800 bytes
First seen:2026-03-19 06:11:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ebc247a77b4d4a804b261f97a1fd075c (43 x Vidar, 18 x Smoke Loader, 3 x Stealc)
ssdeep 24576:CcmI4xQc/tOYpOpHxT/UFAJFPsCmW5mzq3TWtPG7nEtYCo:CcmXxQc/tOYpaTcFA7nmW5mO3T3YZo
TLSH T199955B0ABC9498E6C06A5736C8B622F27B31BC598B3223C71E90BD7C3E726E45D75714
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:de-pumped exe vidar

Intelligence


File Origin
# of uploads :
1
# of downloads :
179
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
source code of carbanak backdoor discovered.exe
Verdict:
Suspicious activity
Analysis date:
2026-03-19 06:12:24 UTC
Tags:
evasion payload golang

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
phishing cobalt
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Creating a process from a recently created file
Sending an HTTP GET request to an infection source
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Connection attempt to an infection source
Query of malicious DNS domain
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan.Win64.Agent.smfteu
Result
Threat name:
LummaC Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected CypherIt Packer
Detected unpacking (creates a PE file in dynamic memory)
Drops PE files to the document folder of the user
Found malware configuration
Inline AutoIt code execution detected
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Potentially malicious time measurement code found
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1886132 Sample: source code of carbanak bac... Startdate: 19/03/2026 Architecture: WINDOWS Score: 100 59 ainodes.xyz 2->59 61 fveDCNhizxTxQKBTphIFAwa.fveDCNhizxTxQKBTphIFAwa 2->61 63 9 other IPs or domains 2->63 79 Suricata IDS alerts for network traffic 2->79 81 Found malware configuration 2->81 83 Antivirus detection for URL or domain 2->83 87 10 other signatures 2->87 12 source code of carbanak backdoor discovered.exe 3 2->12         started        16 rundll32.exe 2->16         started        signatures3 85 Performs DNS queries to domains with low reputation 59->85 process4 dnsIp5 73 ainodes.xyz 112.213.91.61, 443, 49720 SUPERDATA-AS-VNSUPERDATA-VN Viet Nam 12->73 75 95.85.239.146, 3000, 49734 METRONETCZ Czech Republic 12->75 77 5 other IPs or domains 12->77 57 C:\Users\...\4sqqwAL9hf7Bi3njdNiUTt8_.exe, PE32+ 12->57 dropped 18 4sqqwAL9hf7Bi3njdNiUTt8_.exe 1 8 12->18         started        file6 process7 process8 20 cmd.exe 1 18->20         started        23 at.exe 1 18->23         started        signatures9 89 Detected CypherIt Packer 20->89 91 Uses ping.exe to sleep 20->91 93 Uses ping.exe to check the status of other devices and networks 20->93 95 Inline AutoIt code execution detected 20->95 25 cmd.exe 3 20->25         started        28 cmd.exe 1 20->28         started        30 conhost.exe 20->30         started        32 PING.EXE 1 20->32         started        34 conhost.exe 23->34         started        process10 file11 55 C:\Users\user\AppData\Local\...\Instead.exe, PE32 25->55 dropped 36 Instead.exe 25->36         started        40 cmd.exe 1 25->40         started        42 cmd.exe 1 25->42         started        44 5 other processes 25->44 process12 dnsIp13 71 genuscs.cyou 37.77.150.150, 443, 49736, 49739 OBIT-KZ-ASObitTelecommunicationsKazakhstannetworkRU Russian Federation 36->71 97 Tries to steal Mail credentials (via file / registry access) 36->97 99 Tries to harvest and steal browser information (history, passwords, etc) 36->99 101 Tries to steal Crypto Currency Wallets 36->101 103 5 other signatures 36->103 46 chrome.exe 36->46         started        48 findstr.exe 1 40->48         started        signatures14 process15 process16 50 chrome.exe 46->50         started        53 chrome.exe 46->53         started        dnsIp17 65 192.168.2.4, 138, 3000, 443 unknown unknown 50->65 67 www.google.com 142.251.151.119, 443, 49761 GOOGLEUS United States 50->67 69 genuscs.cyou 50->69
Gathering data
Threat name:
Win64.Trojan.Vidar
Status:
Malicious
First seen:
2026-03-19 06:12:16 UTC
File Type:
PE+ (Exe)
Extracted files:
7
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Unpacked files
SH256 hash:
3c87c17ae4e8ef7d193b41f48616aef4d95bdc871a0ac81e5c02ab97d5373079
MD5 hash:
57b70694ac6549065a8ad3eb1e934b3b
SHA1 hash:
022e6add1502d7dfac7185ec3aa4602a9291a154
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Suspicious_Golang_Binary
Author:Tim Machac
Description:Triage: Golang-compiled binary with suspicious OS/persistence/network strings (not family-specific)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe 3c87c17ae4e8ef7d193b41f48616aef4d95bdc871a0ac81e5c02ab97d5373079

(this sample)

Comments