MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b4bced547eb17aa796a64c58e89f9d96e56edab6596e02ec13801bf5d452b97. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments 1

SHA256 hash: 5b4bced547eb17aa796a64c58e89f9d96e56edab6596e02ec13801bf5d452b97
SHA3-384 hash: e4cee7061a4816540a5156879a720e4004bd41cf6790930cc56c7204767c0c0c8f4ed7bfb2fac43d8193c881480ddf84
SHA1 hash: 85d6aae899ae56b45a493d6a65edb460d70f75f2
MD5 hash: d08fb132524e824ca66d315b6fb23ea1
humanhash: bravo-muppet-fifteen-twenty
File name:d08fb132524e824ca66d315b6fb23ea1
Download: download sample
Signature Vidar
File size:323'072 bytes
First seen:2023-09-18 11:07:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d96186b037e8e986f105cf4c4b9c7fbe (2 x Tofsee, 2 x Stealc, 2 x Smoke Loader)
ssdeep 6144:4lJ8wtt/Lod5A0mehi5DGWpmpvcX2Dp7M6Py3OXBjBPTE:43bMbA3SiEbvcX2Dp7V63ORlb
Threatray 4 similar samples on MalwareBazaar
TLSH T1A764E0113A91D0B2F5E6C0351834CAE2A67F7C33A575854B37683F6F7E31242ABAA345
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 08191a2250c0c000 (1 x Vidar)
Reporter zbetcheckin
Tags:32 exe vidar

Intelligence


File Origin
# of uploads :
1
# of downloads :
309
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
http://tamk2op.top/build.exe
Verdict:
Malicious activity
Analysis date:
2023-09-18 10:34:36 UTC
Tags:
loader arkei

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Arkei Stealer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-09-18 11:08:05 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
21 of 23 (91.30%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:e881aaf79bbebc43874722496eacba76 discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses 2FA software files, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Vidar
Malware Config
C2 Extraction:
https://steamcommunity.com/profiles/76561199550790047
https://t.me/bonoboaz
Unpacked files
SH256 hash:
cc813c52471a83c4c9928652cc40b5d886037b0e0197fb6028acf44e10c3ce3b
MD5 hash:
037c0a29d5cc7e94d96fc5589c67b66c
SHA1 hash:
9102cb43a930ef18a94eff5175817b3ca9b76d2d
Detections:
VidarStealer
SH256 hash:
5b4bced547eb17aa796a64c58e89f9d96e56edab6596e02ec13801bf5d452b97
MD5 hash:
d08fb132524e824ca66d315b6fb23ea1
SHA1 hash:
85d6aae899ae56b45a493d6a65edb460d70f75f2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe 5b4bced547eb17aa796a64c58e89f9d96e56edab6596e02ec13801bf5d452b97

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-09-18 11:07:24 UTC

url : hxxp://tamk2op.top/build.exe