MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 744297bcd2d98c191d2263429548c914851928288d74cf65965c30c8d261ce4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Vidar
Vendor detections: 13
| SHA256 hash: | 744297bcd2d98c191d2263429548c914851928288d74cf65965c30c8d261ce4f |
|---|---|
| SHA3-384 hash: | 18ea897de545b9068db613f46fc70c7d571ff0a689d95324c4efbf1efef1c1581f8443eb607c1a97a07bfaf561d29e41 |
| SHA1 hash: | b6e5b0a3560f682e632a2e64e33cd754587d0663 |
| MD5 hash: | 40786afd529fa3505744f1c1f61b7781 |
| humanhash: | march-california-south-ack |
| File name: | file |
| Download: | download sample |
| Signature | Vidar |
| File size: | 244'224 bytes |
| First seen: | 2024-02-29 09:20:51 UTC |
| Last seen: | 2024-02-29 11:15:38 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f8908c7cc4201a5ad049f35594953f36 (1 x Vidar) |
| ssdeep | 3072:4y/oHYc5GQbPS5aJ2s25tLWu53r01t8HIzqkH3Ni+zouhMBzJvZ9Kj9jIpqAWrod:7IBG+SIJwtLWu53cfUuKBtZ9gJFAWmI |
| TLSH | T10634D021F2D2C831D7A70534B874D6B00A7ABBF22975428F77643B6A5E712C01A38F76 |
| TrID | 37.3% (.EXE) Win64 Executable (generic) (10523/12/4) 17.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 15.9% (.EXE) Win32 Executable (generic) (4504/4/1) 7.3% (.ICL) Windows Icons Library (generic) (2059/9) 7.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 64d29a9889a9a989 (2 x Stealc, 1 x Vidar, 1 x LummaStealer) |
| Reporter | |
| Tags: | exe vidar |
Bitsight
url: https://vk.com/doc329118071_675406576?hash=eZTUwKWKWsPvybP6qbb5CRvCUbk04jz0FY3OgKEzuzP&dl=RETDfxfOLs4jUFgBEQmWLRotseCM3fh9Iw8MTCwXmT0&api=1&no_preview=1#gtIntelligence
File Origin
USVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://t.me/neoschats
Unpacked files
65429cc8e058b11f92e4fe5f36528aef791097679d0984b977f47c6ef936ad64
b1e5bd12279ecaf63aa22e082d6e833d8137d35ee32f87d2798e30e51a91367c
81325d0c1a73cad7402d2020c15304cba466ecc7919061cd16762f655019c038
74c513cfcefe956a1ebe5c7196d31319580523c277333b59816ed48456ed75b5
aec37f0045fb7091d04f8eedd38d171debaec8225d344a8050cea1c31b435e74
744297bcd2d98c191d2263429548c914851928288d74cf65965c30c8d261ce4f
a183934f8e5161ab94c2bd78598b6138b3990a3a2c55b82fa5a7137be3cf6f72
28c2e53d3c42ec59ffb971a46d10bf54f29917e9e32af1d7a76956045726c5e6
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Check_Dlls |
|---|
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | has_telegram_urls |
|---|---|
| Author: | Aaron DeVera<aaron@backchannel.re> |
| Description: | Detects Telegram URLs |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs |
|---|---|
| Author: | ditekSHen |
| Description: | Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs |
|---|---|
| Author: | ditekSHen |
| Description: | Detect binaries embedding considerable number of MFA browser extension IDs. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Windows executables referencing non-Windows User-Agents |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | QbotStuff |
|---|---|
| Author: | anonymous |
| Rule name: | Windows_Generic_Threat_c374cd85 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.