MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 618ddac39dc3d601a7c97d075ab084ae5f71a4e788c86f9e7f0975e0e1ae83fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 618ddac39dc3d601a7c97d075ab084ae5f71a4e788c86f9e7f0975e0e1ae83fc
SHA3-384 hash: 1978f186010d360574a96e34c5119712f7d22741287f0f73f7b1865e24c4b9964b24b15a0343910e928f9e6b5a2f9a17
SHA1 hash: 6b69e49cd1192bd0ef92d95263f92058ebe92421
MD5 hash: dc8144a080fb46516b3833c2f5718609
humanhash: london-steak-tennis-stairway
File name:random.exe
Download: download sample
Signature Vidar
File size:2'432'512 bytes
First seen:2025-10-24 09:30:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:gY9Han/n6ml7OoZsS7UoFabCFVBRBtFzsVI7LbTLC+cGqefydhSekaU:gUH4n63oH3LBR1si7W+cGlKzSeka
TLSH T1FCB53373BD510882D598D2F26227A3977D60FA239A93E3C1306F55A3DD16F2C8979233
TrID 38.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.6% (.ICL) Windows Icons Library (generic) (2059/9)
15.4% (.EXE) OS/2 Executable (generic) (2029/13)
15.2% (.EXE) Generic Win/DOS Executable (2002/3)
15.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe vidar

Intelligence


File Origin
# of uploads :
1
# of downloads :
222
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-10-24 09:35:48 UTC
Tags:
stealer stealc vidar xor-url generic themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
emotet spawn small virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Behavior that indicates a threat
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypt obfuscated packed packed themidawinlicense
Verdict:
Malicious
Labled as:
Trojan[Backdoor]/MSIL.Bladabindi
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-10-23T17:44:00Z UTC
Last seen:
2025-10-25T13:14:00Z UTC
Hits:
~100
Detections:
Trojan-PSW.Stealerc.TCP.C&C Trojan-PSW.Stealerc.HTTP.C&C PDM:Trojan.Win32.Generic HEUR:Trojan-Spy.Win64.Bobik.gen Trojan-Spy.Win64.Bobik.cf Trojan-PSW.Vidar.HTTP.C&C
Result
Threat name:
Amadey, HijackLoader, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected malicious Powershell script
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies the context of a thread in another process (thread injection)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Sample uses string decryption to hide its real strings
Sets debug register (to hijack the execution of another thread)
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected HijackLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1801162 Sample: random.exe Startdate: 24/10/2025 Architecture: WINDOWS Score: 100 112 stg.mistonecorp.net 2->112 114 www.google.com 2->114 116 14 other IPs or domains 2->116 138 Suricata IDS alerts for network traffic 2->138 140 Found malware configuration 2->140 142 Antivirus detection for URL or domain 2->142 144 16 other signatures 2->144 11 random.exe 29 2->11         started        16 7ee1f6e171.exe 2->16         started        18 msedge.exe 2->18         started        20 7ee1f6e171.exe 2->20         started        signatures3 process4 dnsIp5 124 stg.mistonecorp.net 5.75.210.202, 443, 49691, 49692 HETZNER-ASDE Germany 11->124 126 telegram.me 149.154.167.99, 443, 49690, 49915 TELEGRAMRU United Kingdom 11->126 128 178.16.55.189, 49904, 49910, 49914 DUSNET-ASDE Germany 11->128 108 C:\Users\user\AppData\...\VMVU6eIkeV.exe, PE32 11->108 dropped 174 Detected unpacking (changes PE section rights) 11->174 176 Contains functionality to start a terminal service 11->176 178 Tries to harvest and steal browser information (history, passwords, etc) 11->178 182 7 other signatures 11->182 22 cmd.exe 11->22         started        24 msedge.exe 2 12 11->24         started        27 msedge.exe 11->27         started        36 19 other processes 11->36 180 Found direct / indirect Syscall (likely to bypass EDR) 16->180 130 239.255.255.250 unknown Reserved 18->130 29 msedge.exe 18->29         started        32 msedge.exe 18->32         started        34 msedge.exe 18->34         started        file6 signatures7 process8 dnsIp9 39 VMVU6eIkeV.exe 22->39         started        44 conhost.exe 22->44         started        150 Monitors registry run keys for changes 24->150 46 msedge.exe 24->46         started        48 msedge.exe 27->48         started        132 a434.dscr.akamai.net 23.206.171.19, 443, 49778 NTT-COMMUNICATIONS-2914US United States 29->132 134 a1666.dscr.akamai.net 23.206.171.42, 443, 49784 NTT-COMMUNICATIONS-2914US United States 29->134 136 32 other IPs or domains 29->136 82 C:\ProgramData\Microsoft\...\Report.wer, Unicode 36->82 dropped 50 chrome.exe 36->50         started        52 chrome.exe 36->52         started        54 chrome.exe 36->54         started        56 2 other processes 36->56 file10 signatures11 process12 dnsIp13 118 94.154.35.25, 49906, 49909, 49913 SELECTELRU Ukraine 39->118 92 C:\Users\user\AppData\Local\...\lUCRP4G.exe, PE32 39->92 dropped 94 C:\Users\user\AppData\Local\...\ddXUHzM.exe, PE32+ 39->94 dropped 96 C:\Users\user\AppData\...\ea72b22f2c.exe, PE32+ 39->96 dropped 98 8 other malicious files 39->98 dropped 152 Multi AV Scanner detection for dropped file 39->152 154 Contains functionality to start a terminal service 39->154 156 Contains functionality to inject code into remote processes 39->156 58 BgsBpAw.exe 39->58         started        62 7ee1f6e171.exe 39->62         started        64 ea72b22f2c.exe 39->64         started        66 powershell.exe 39->66         started        120 www.google.com 142.250.69.164, 443, 49709, 49712 GOOGLEUS United States 50->120 122 142.250.217.100, 443, 49727 GOOGLEUS United States 52->122 file14 signatures15 process16 file17 100 C:\Users\user\AppData\Local\Temp\quazip.dll, PE32 58->100 dropped 102 C:\Users\user\AppData\...\openvr_api.dll, PE32 58->102 dropped 104 C:\Users\user\AppData\...\VCRUNTIME140.dll, PE32 58->104 dropped 106 11 other malicious files 58->106 dropped 158 Multi AV Scanner detection for dropped file 58->158 68 HyperBr16.exe 58->68         started        160 Detected unpacking (changes PE section rights) 62->160 162 Tries to harvest and steal browser information (history, passwords, etc) 62->162 164 Writes to foreign memory regions 62->164 172 2 other signatures 62->172 166 Modifies the context of a thread in another process (thread injection) 64->166 168 Injects a PE file into a foreign processes 64->168 72 ea72b22f2c.exe 64->72         started        170 Suspicious powershell command line found 66->170 74 conhost.exe 66->74         started        76 powershell.exe 66->76         started        signatures18 process19 file20 84 C:\ProgramData\...\quazip.dll, PE32 68->84 dropped 86 C:\ProgramData\...\openvr_api.dll, PE32 68->86 dropped 88 C:\ProgramData\...\VCRUNTIME140.dll, PE32 68->88 dropped 90 11 other files (8 malicious) 68->90 dropped 146 Switches to a custom stack to bypass stack traces 68->146 148 Found direct / indirect Syscall (likely to bypass EDR) 68->148 78 HyperBr16.exe 68->78         started        signatures21 process22 file23 110 C:\Users\user\AppData\Roaming\...\XPFix.exe, PE32 78->110 dropped 184 Switches to a custom stack to bypass stack traces 78->184 186 Found direct / indirect Syscall (likely to bypass EDR) 78->186 signatures24
Gathering data
Threat name:
Win64.Spyware.Vidar
Status:
Suspicious
First seen:
2025-10-24 00:56:50 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
18 of 24 (75.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Checks BIOS information in registry
Verdict:
Malicious
Tags:
Stealc
YARA:
n/a
Unpacked files
SH256 hash:
618ddac39dc3d601a7c97d075ab084ae5f71a4e788c86f9e7f0975e0e1ae83fc
MD5 hash:
dc8144a080fb46516b3833c2f5718609
SHA1 hash:
6b69e49cd1192bd0ef92d95263f92058ebe92421
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe 618ddac39dc3d601a7c97d075ab084ae5f71a4e788c86f9e7f0975e0e1ae83fc

(this sample)

  
Delivery method
Distributed via web download

Comments