MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 adf7784684473f38bd5a1f9787d7c755072bbb165cb6901896f0902facd272d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: adf7784684473f38bd5a1f9787d7c755072bbb165cb6901896f0902facd272d2
SHA3-384 hash: 61f65bf1f77dcdba50be215b279eee5ff90366fbed869aa0395787185d7b607f1641974a0d1d10606473d53f02162520
SHA1 hash: 5ddc29cfe0cb5762d4c43e443cfb2b8339b4e0ac
MD5 hash: 69751141261b33ad9a58cd79449acea4
humanhash: nuts-pasta-twenty-april
File name:file
Download: download sample
Signature Vidar
File size:6'608'848 bytes
First seen:2023-07-25 16:53:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f1bd124d6dc8328b4493810e4f472e47 (1 x Vidar)
ssdeep 49152:ReN61DKS4P3eC8997XTc0UtqPLtWAVv9couP+i0u8:IN61GS4feB9nzUQ9VFcyiF8
Threatray 603 similar samples on MalwareBazaar
TLSH T1A5669F62684D4B3FE8E5B07EAAA3885363F1BF443134EDD5C4E4EE572C4F1A0792914A
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter andretavare5
Tags:exe vidar


Avatar
andretavare5
Sample downloaded from https://vk.com/doc801981293_666975507?hash=s0OfTPzzAEFkSE8Gzu75EueDciZ1ZBoigRbmuqBZz74&dl=Jb7XSssf0urHRxGZHFTp5QZqg5GgVvMCeIoSwoQjKZH&api=1&no_preview=1#scjeen

Intelligence


File Origin
# of uploads :
1
# of downloads :
349
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
No threats detected
Analysis date:
2023-07-25 16:56:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Searching for the window
Creating a file in the %AppData% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
DNS request
Creating a file
Reading critical registry keys
Stealing user critical data
Adding an exclusion to Microsoft Defender
Sending an HTTP GET request to an infection source
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Searches for specific processes (likely to inject)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1279380 Sample: file.exe Startdate: 25/07/2023 Architecture: WINDOWS Score: 100 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 Yara detected Vidar stealer 2->39 41 4 other signatures 2->41 7 file.exe 2 2->7         started        process3 file4 27 C:\Users\user\AppData\...\ZbMlHusnTV.exe, PE32 7->27 dropped 43 Adds a directory exclusion to Windows Defender 7->43 11 ZbMlHusnTV.exe 16 7->11         started        15 cmd.exe 1 7->15         started        17 cmd.exe 1 7->17         started        signatures5 process6 dnsIp7 29 t.me 149.154.167.99, 443, 49697 TELEGRAMRU United Kingdom 11->29 31 5.75.214.16, 12771, 49698 HETZNER-ASDE Germany 11->31 33 192.168.2.1 unknown unknown 11->33 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->45 47 Machine Learning detection for dropped file 11->47 49 Tries to harvest and steal browser information (history, passwords, etc) 11->49 53 2 other signatures 11->53 51 Adds a directory exclusion to Windows Defender 15->51 19 powershell.exe 17 15->19         started        21 conhost.exe 15->21         started        23 powershell.exe 18 17->23         started        25 conhost.exe 17->25         started        signatures8 process9
Threat name:
Win64.Spyware.Vidar
Status:
Suspicious
First seen:
2023-07-25 16:54:07 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
14 of 24 (58.33%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:https://t.me/dastantim discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Maps connected drives based on registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Vidar
Malware Config
C2 Extraction:
https://t.me/dastantim
https://steamcommunity.com/profiles/76561199529242058
Unpacked files
SH256 hash:
adf7784684473f38bd5a1f9787d7c755072bbb165cb6901896f0902facd272d2
MD5 hash:
69751141261b33ad9a58cd79449acea4
SHA1 hash:
5ddc29cfe0cb5762d4c43e443cfb2b8339b4e0ac
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments