MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 44f6100a2d95f01fb7e692367928f9df629c556680bc74fe45011482184c8b61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 12


Intelligence 12 IOCs YARA 26 File information Comments

SHA256 hash: 44f6100a2d95f01fb7e692367928f9df629c556680bc74fe45011482184c8b61
SHA3-384 hash: 6c86b633bf0c33429266bade8a99b676295ae2aebb76ec4dea3caffb283bdbe1e08352dc60120e2e426eefd7a9edced6
SHA1 hash: 4655fd1d0ab47cd046a8043ed8c3dc2a87c0d5a4
MD5 hash: d7d08069ca5131d2f153a3a9b60455ff
humanhash: zulu-mango-lithium-juliet
File name:file
Download: download sample
Signature Vidar
File size:2'841'200 bytes
First seen:2023-02-09 07:58:45 UTC
Last seen:2023-02-09 08:02:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9cbefe68f395e67356e2a5d8d1b285c0 (58 x LummaStealer, 49 x AuroraStealer, 35 x Vidar)
ssdeep 49152:HCSHvx8vQiFUYisfslgff2KWF+xdguj67gOJLiQiHfsdbpB+oYa1+e:HCSHZy/UY1klTzF6dpXOgQi/a7+Ne
Threatray 1'265 similar samples on MalwareBazaar
TLSH T16FD5E042FCE764B1E501167209A7D2EF2335B9091F32DFC7DA40BFAAAD725E01932225
gimphash 94c6799a110c6446cb3816d258b8b7c67d8da5ed1e609a18a9655b10cc1392b6
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter andretavare5
Tags:exe signed vidar

Code Signing Certificate

Organisation:Hangil IT Co., Ltd
Issuer:Sectigo Public Code Signing CA R36
Algorithm:sha384WithRSAEncryption
Valid from:2021-11-10T00:00:00Z
Valid to:2024-11-09T23:59:59Z
Serial number: 0139dde119bb320dfb9f5defe3f71245
Intelligence: 17 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Cert Central Blocklist:This certificate is on the Cert Central blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 23d13a8e48a6eff191a5d6a0635b99467c2e7242ae520479cae130fbd41cc645
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
andretavare5
Sample downloaded from https://amikstiekomsu.ac.id/TranKLPort354259.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
No threats detected
Analysis date:
2023-02-09 08:02:04 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a window
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
golang overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-02-09 07:59:08 UTC
File Type:
PE (Exe)
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:589 spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Vidar
Unpacked files
SH256 hash:
3933e4d062c441454563c64a7cee8f025e2b73a4904bd086573fcc6313fad8c2
MD5 hash:
3ff2ae05ba2b6d6d765d2dac1d95424b
SHA1 hash:
fbdc6bf26421ab85e97995efe7a57312a2fccc97
Detections:
VidarStealer
SH256 hash:
676ce887ccfaffbf8eaea994f5250277fc9121f20964d73643cf6493824f19cc
MD5 hash:
e1a5e37ecf5d68f7abd73d912525a566
SHA1 hash:
22f6f6612c74430e1c5b7d717846aa4fe68111d2
SH256 hash:
44f6100a2d95f01fb7e692367928f9df629c556680bc74fe45011482184c8b61
MD5 hash:
d7d08069ca5131d2f153a3a9b60455ff
SHA1 hash:
4655fd1d0ab47cd046a8043ed8c3dc2a87c0d5a4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:grakate_stealer_nov_2021
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Telegram_Links
Rule name:Windows_Trojan_Donutloader_f40e3759
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments