MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 aac4be8da4dd61b9c80cdd4fbfd32aca1189947644318a7a3627a502b3f8e128. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Vidar
Vendor detections: 17
| SHA256 hash: | aac4be8da4dd61b9c80cdd4fbfd32aca1189947644318a7a3627a502b3f8e128 |
|---|---|
| SHA3-384 hash: | 4c9709768eeff9e60d778827fe93d13a7a031b64c1bc47a379fb30066797086f13132d2a8a3b77ec55a0bd7e210c69e0 |
| SHA1 hash: | 196faab04a4dcb3be42de4cf6b1e285f971f0e8d |
| MD5 hash: | 9480e05f69188e1de340793d85d76169 |
| humanhash: | yankee-ten-zulu-don |
| File name: | setup.exe |
| Download: | download sample |
| Signature | Vidar |
| File size: | 334'336 bytes |
| First seen: | 2023-04-27 00:13:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fd12f8d1ea172054b775d38fe9a5aa5d (2 x Rhadamanthys, 1 x Vidar) |
| ssdeep | 6144:C24oSdb1I9TORmtyqX+2Q/rsNW9aMUuEsbm6ckJC:C24HRmYqX+2Q/oNwaMHBV |
| Threatray | 643 similar samples on MalwareBazaar |
| TLSH | T1EE64F1217A91DC73C85744F01824E6A49B3DBCA0564945DF13D83FBE6E336828ABB3D9 |
| TrID | 60.4% (.EXE) InstallShield setup (43053/19/16) 14.7% (.EXE) Win64 Executable (generic) (10523/12/4) 7.0% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.8% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 01a4b29888e4b080 (1 x Vidar) |
| Reporter | |
| Tags: | exe vidar |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://t.me/tg_duckworld
http://89.23.97.128
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | has_telegram_urls |
|---|---|
| Author: | Aaron DeVera<aaron@backchannel.re> |
| Description: | Detects Telegram URLs |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | Telegram_Links |
|---|
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_vidar_a_a901 |
|---|---|
| Author: | Johannes Bader |
| Description: | detect unpacked Vidar samples |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.