MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 52b70e93f94a283fc21c250db083e78fa3b7b0da91e21c7f6ac89cde730638fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Vidar
Vendor detections: 15
| SHA256 hash: | 52b70e93f94a283fc21c250db083e78fa3b7b0da91e21c7f6ac89cde730638fa |
|---|---|
| SHA3-384 hash: | c191da7c8c707fbc68368cfae22fc2d83d9ed15dd2871c0481e453beb546242b1b5c037fb3a73aef9a228c1fadac63ba |
| SHA1 hash: | cdd5cf73dc063cd659a86b49c489145eabe9f014 |
| MD5 hash: | 24e3ece1b4afc35debc48f9ce66838a6 |
| humanhash: | tennis-pasta-jupiter-grey |
| File name: | file |
| Download: | download sample |
| Signature | Vidar |
| File size: | 372'224 bytes |
| First seen: | 2024-05-18 14:38:28 UTC |
| Last seen: | 2024-05-18 15:27:45 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e0b6966096a2c186c5f52fee6a381e0f (2 x Vidar, 1 x RedLineStealer) |
| ssdeep | 6144:8B9LSp8zWMtAJAiDUw6wJb3kH/XVWvcQU/Hvt5YzfBtnCZa6n:ULSpmlw6wF0HdWvVAH15yIFn |
| Threatray | 51 similar samples on MalwareBazaar |
| TLSH | T1D084D051B4C08072D67325364DE0DAB19E7EF8744BA29D9F37940BBE0F342D2DA2196B |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Reporter | |
| Tags: | exe vidar |
Bitsight
url: https://vk.com/doc5294803_669710019?hash=o5p4UttryVbhzjQfPqEx49Vk0fwoNCkzZhkdI7qe1ik&dl=vjH6Rb0crg0A7ORvMJnsyELGwKqplIFM4bUotjXG9pP&api=1&no_preview=1#meneIntelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateRemoteThread KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetCommandLineA KERNEL32.dll::GetCommandLineW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::FreeConsole KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleOutputCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateFileW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.