MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e78c3de2b0347f498ed404869731f1e6f04a67713dfba349b4c7e43e8d7b937. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 16


Intelligence 16 IOCs YARA 4 File information Comments

SHA256 hash: 4e78c3de2b0347f498ed404869731f1e6f04a67713dfba349b4c7e43e8d7b937
SHA3-384 hash: 35090da4bf85c8eee2c27cfda48b6f8d6213211df36229ead3553d3e0c193aafe7a67262be198f88d9fecf2a36e28cdd
SHA1 hash: 7beee707a6201ebf8188edc069ca1957d9ec809c
MD5 hash: bb47e18f118fa8cd9804befeb7568324
humanhash: pizza-iowa-wisconsin-hawaii
File name:VisualCode.exe
Download: download sample
Signature Vidar
File size:640'512 bytes
First seen:2025-05-05 08:38:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3e2a6ecfffc5d43a7565ef87874e92c4 (49 x LummaStealer, 13 x Vidar, 3 x Stealc)
ssdeep 12288:PwRnSthcWwgFOx6ODTlcrWpLUlY15YcHxw7+t5IDecHxw7+t5ID:P+nS2xTiYw7+PIDbw7+PID
Threatray 139 similar samples on MalwareBazaar
TLSH T149D4CF14D31598DBFE7604B688136260B433792187288FFF62A8D7716F076D16E3EB29
TrID 63.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe vidar

Intelligence


File Origin
# of uploads :
1
# of downloads :
482
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
VisualCode.exe
Verdict:
Malicious activity
Analysis date:
2025-05-05 09:16:50 UTC
Tags:
vidar stealer telegram loader lumma auto-reg rat quasar remote asyncrat evasion njrat bladabindi backdoor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
injection obfusc virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
microsoft_visual_cc packed packed packer_detected
Result
Threat name:
AsyncRAT, LummaC Stealer, Njrat, Quasar,
Detection:
malicious
Classification:
phis.troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Disables zone checking for all users
Drops PE files to the startup folder
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected LummaC Stealer
Yara detected Njrat
Yara detected Quasar RAT
Yara detected VenomRAT
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1681184 Sample: VisualCode.exe Startdate: 05/05/2025 Architecture: WINDOWS Score: 100 100 itsrevolutionmagnus.xyz 2->100 102 t.me 2->102 104 8 other IPs or domains 2->104 160 Suricata IDS alerts for network traffic 2->160 162 Found malware configuration 2->162 164 Malicious sample detected (through community Yara rule) 2->164 168 24 other signatures 2->168 11 VisualCode.exe 2->11         started        14 svchost.exe 2->14         started        16 Server.exe 2->16         started        18 11 other processes 2->18 signatures3 166 Performs DNS queries to domains with low reputation 100->166 process4 dnsIp5 178 Writes to foreign memory regions 11->178 180 Allocates memory in foreign processes 11->180 182 Injects a PE file into a foreign processes 11->182 21 MSBuild.exe 39 11->21         started        184 Changes security center settings (notifications, updates, antivirus, firewall) 14->184 186 Multi AV Scanner detection for dropped file 16->186 106 239.255.255.250 unknown Reserved 18->106 26 msedge.exe 18->26         started        28 msedge.exe 18->28         started        30 msedge.exe 18->30         started        signatures6 process7 dnsIp8 108 t.me 149.154.167.99, 443, 49683 TELEGRAMRU United Kingdom 21->108 110 66.44.4t.com 5.75.209.111, 443, 49684, 49685 HETZNER-ASDE Germany 21->110 116 2 other IPs or domains 21->116 88 C:\Users\user\AppData\Local\...\V_Br[1].exe, PE32 21->88 dropped 90 C:\Users\user\AppData\Local\...\Q_Br[1].exe, PE32 21->90 dropped 92 C:\Users\user\AppData\Local\...\Shtray[1].exe, PE32 21->92 dropped 94 7 other malicious files 21->94 dropped 170 Attempt to bypass Chrome Application-Bound Encryption 21->170 172 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 21->172 174 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 21->174 176 7 other signatures 21->176 32 790zmg4ect.exe 21->32         started        36 89r1vknyuk.exe 21->36         started        38 je37900zu3.exe 21->38         started        40 5 other processes 21->40 112 13.107.246.69 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->112 114 s-part-0043.t-0009.t-msedge.net 13.107.246.71, 443, 49737, 49773 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->114 118 34 other IPs or domains 26->118 file9 signatures10 process11 dnsIp12 80 C:\Users\user\AppData\Local\...\svchost.exe, PE32 32->80 dropped 134 Antivirus detection for dropped file 32->134 136 Multi AV Scanner detection for dropped file 32->136 138 Drops PE files with benign system names 32->138 43 svchost.exe 32->43         started        140 Writes to foreign memory regions 36->140 142 Allocates memory in foreign processes 36->142 144 Injects a PE file into a foreign processes 36->144 47 MSBuild.exe 36->47         started        82 C:\Users\user\...\49lULZYpQRTgCgDe.exe, PE32 38->82 dropped 146 Query firmware table information (likely to detect VMs) 38->146 148 Tries to detect sandboxes and other dynamic analysis tools (window names) 38->148 150 Hides threads from debuggers 38->150 158 2 other signatures 38->158 120 192.168.2.9, 443, 4441, 49672 unknown unknown 40->120 84 C:\Users\user\AppData\...\Jakc Driver.exe, PE32 40->84 dropped 86 C:\Users\user\AppData\Local\...\AMD Sound.exe, PE32 40->86 dropped 152 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 40->152 154 Monitors registry run keys for changes 40->154 156 Hides that the sample has been downloaded from the Internet (zone.identifier) 40->156 50 cmd.exe 40->50         started        52 Jakc Driver.exe 40->52         started        54 cmd.exe 40->54         started        56 4 other processes 40->56 file13 signatures14 process15 dnsIp16 96 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 43->96 dropped 98 C:\Users\user\AppData\Local\Temp\Server.exe, PE32 43->98 dropped 188 System process connects to network (likely due to code injection or exploit) 43->188 190 Multi AV Scanner detection for dropped file 43->190 192 Disables zone checking for all users 43->192 204 2 other signatures 43->204 58 schtasks.exe 43->58         started        124 orjinalecza.net 104.21.87.14, 443, 49797, 49799 CLOUDFLARENETUS United States 47->124 194 Query firmware table information (likely to detect VMs) 47->194 196 Tries to harvest and steal ftp login credentials 47->196 198 Tries to harvest and steal browser information (history, passwords, etc) 47->198 206 2 other signatures 47->206 60 AMD Sound.exe 50->60         started        64 conhost.exe 50->64         started        66 timeout.exe 50->66         started        126 ipwho.is 108.181.47.111, 443, 49809 ASN852CA Canada 52->126 200 Hides that the sample has been downloaded from the Internet (zone.identifier) 52->200 68 schtasks.exe 52->68         started        202 Uses schtasks.exe or at.exe to add and modify task schedules 54->202 70 conhost.exe 54->70         started        72 schtasks.exe 54->72         started        128 www.google.com 142.250.72.228, 443, 49704, 49706 GOOGLEUS United States 56->128 130 ogads-pa.clients6.google.com 172.217.12.138, 443, 49713, 49715 GOOGLEUS United States 56->130 132 3 other IPs or domains 56->132 74 conhost.exe 56->74         started        file17 signatures18 process19 dnsIp20 76 conhost.exe 58->76         started        122 94.26.90.81, 4441, 49802, 49806 ASDETUKhttpwwwheficedcomGB Bulgaria 60->122 208 Tries to detect sandboxes / dynamic malware analysis system (Installed program check) 60->208 78 conhost.exe 68->78         started        signatures21 process22
Threat name:
Win64.Spyware.Vidar
Status:
Malicious
First seen:
2025-05-04 18:10:21 UTC
File Type:
PE+ (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar family:vidar botnet:158fdd2a4f5abb978509580715e5353f botnet:edge credential_access discovery spyware stealer trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Executes dropped EXE
Unsecured Credentials: Credentials In Files
Downloads MZ/PE file
Uses browser remote debugging
Detect Vidar Stealer
Quasar RAT
Quasar family
Quasar payload
Vidar
Vidar family
Malware Config
C2 Extraction:
https://t.me/m00f3r
https://steamcommunity.com/profiles/76561199851454339
94.26.90.81:5437
Verdict:
Suspicious
Tags:
stealc
YARA:
n/a
Unpacked files
SH256 hash:
4e78c3de2b0347f498ed404869731f1e6f04a67713dfba349b4c7e43e8d7b937
MD5 hash:
bb47e18f118fa8cd9804befeb7568324
SHA1 hash:
7beee707a6201ebf8188edc069ca1957d9ec809c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe 4e78c3de2b0347f498ed404869731f1e6f04a67713dfba349b4c7e43e8d7b937

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileW

Comments