MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6001d345bd68cb763de7c0085b0362b49b00616168cc9efe506ff5a6c786f16b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 6001d345bd68cb763de7c0085b0362b49b00616168cc9efe506ff5a6c786f16b
SHA3-384 hash: deb15797747d878c23d8db15318dc3d428ccae4586966329ee2ca0b9ed1b4c5e07a4e120cd999da3fb1acdd0bd5d782d
SHA1 hash: f408f2b3a1800380cdb819e5d7a8e80becd82f92
MD5 hash: 5805d9ab7c9d3ec0b2fa07af318d4478
humanhash: november-nineteen-hotel-quiet
File name:file
Download: download sample
Signature Vidar
File size:1'785'856 bytes
First seen:2026-02-01 07:36:43 UTC
Last seen:2026-02-01 08:49:56 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:mtLcpVLxbmcmye8/ytSfBxrt2aWZmidzaqbLtJQ3TtPYVRlbMwt/ZxlVDzxL1:7pxxbKyitSpxpjKfWEuNYVRp/PzxL1
TLSH T1378522613E8EC237C3AA163788BA8765261EBC740B35D0CF779039599E707D2B939352
TrID 98.2% (.MSI) Microsoft Windows Installer (454500/1/170)
1.7% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter Bitsight
Tags:dropped-by-amadey fbf543 msi vidar


Avatar
Bitsight
url: http://130.12.180.43/files/8035438604/X5P2hQO.msi

Intelligence


File Origin
# of uploads :
13
# of downloads :
117
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug anti-vm CAB crypto crypto expand explorer fingerprint fingerprint installer installer keylogger lolbin packed wix
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
msi
First seen:
2026-02-01T04:46:00Z UTC
Last seen:
2026-02-02T06:43:00Z UTC
Hits:
~10
Detections:
VHO:Trojan-PSW.Win32.Convagent.gen Trojan-PSW.Win32.Vidar.d Trojan.Win64.Agent.sb PDM:Trojan.Win32.Generic Trojan-PSW.Win32.Vidar.hjd
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
CAB:COMPRESSION:LZX Executable Office Document PDB Path PE (Portable Executable) PE File Layout PE Memory-Mapped (Dump)
Threat name:
Win64.Trojan.Vidar
Status:
Malicious
First seen:
2026-02-01 07:37:36 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar discovery persistence privilege_escalation ransomware stealer
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Detects Vidar Stealer
Vidar
Vidar family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Microsoft Software Installer (MSI) msi 6001d345bd68cb763de7c0085b0362b49b00616168cc9efe506ff5a6c786f16b

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments