MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d79a3310cc4ed4855eacdbe9061403f8f40f2867c54705bbd74c6a122698ea39. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: d79a3310cc4ed4855eacdbe9061403f8f40f2867c54705bbd74c6a122698ea39
SHA3-384 hash: 92f1c135c7c4885e518cb61b08f417faef1bf6463c83e9318347085af64acaec3d07cc86e76bb939791b62a6996661dc
SHA1 hash: 172585a483a34438de9b55ec93e03bb8eccb3246
MD5 hash: a3f71b2ad4e55ec9aa063378ef563f82
humanhash: rugby-cold-mexico-missouri
File name:𝗦𝗘𝗧𝗨𝗣.exe
Download: download sample
Signature Vidar
File size:998'363 bytes
First seen:2025-05-21 19:08:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bf95d1fc1d10de18b32654b123ad5e1f (327 x LummaStealer, 65 x Rhadamanthys, 25 x Vidar)
ssdeep 24576:y0aAs/xWAksPyEubiHslERy51f8vEXFghAEOaI5i:yV/zPEbiHzRy51EMLLami
Threatray 371 similar samples on MalwareBazaar
TLSH T1AC25230785779829EA92163105E0AD3FBBF617160E178ACF57C09934A7BF317DC85E82
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon fe2e72332efec483 (1 x Vidar)
Reporter aachum
Tags:AutoIT CypherIT exe vidar


Avatar
iamaachum
https://mdowny11.cfd/scan/l36h4UA2NtF7diU?kEu2Dpc?utm=1dXWab => https://mega.nz/file/SFkwSDiI#LT02bng-2hrT1ASxQwQNoa9Q1S-I6Dd55DWJbM4KnW0

Vidar Botnet: da630d686e02fcfc0a26a312519f24c6
Vidar C2:
https://t.me/eom25t
https://steamcommunity.com/profiles/76561199855598339
https://d3.7.4t.com/

Intelligence


File Origin
# of uploads :
1
# of downloads :
488
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
71f6b304-f2df-4edf-9ec8-eb5d87282b03
Verdict:
Malicious activity
Analysis date:
2025-05-21 19:01:48 UTC
Tags:
autoit telegram vidar stealer stealc autoit-loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autoit emotet
Result
Verdict:
Clean
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
blackhole expired-cert installer invalid-signature microsoft_visual_cc overlay overlay packed packed packer_detected signed
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code references suspicious native API functions
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Drops PE files with a suspicious file extension
Encrypted powershell cmdline option found
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Suspicious execution chain found
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Powershell decode and execute
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1696250 Sample: #Ud835#Udde6#Ud835#Uddd8#Ud... Startdate: 21/05/2025 Architecture: WINDOWS Score: 100 98 HPRpYYfelFtPwdtxaYeccaCoY.HPRpYYfelFtPwdtxaYeccaCoY 2->98 100 t.me 2->100 102 d3.7.4t.com 2->102 110 Suricata IDS alerts for network traffic 2->110 112 Malicious sample detected (through community Yara rule) 2->112 114 Multi AV Scanner detection for submitted file 2->114 116 7 other signatures 2->116 11 #Ud835#Udde6#Ud835#Uddd8#Ud835#Udde7#Ud835#Udde8#Ud835#Udde3.exe 20 2->11         started        signatures3 process4 process5 13 cmd.exe 3 11->13         started        file6 90 C:\Users\user\AppData\Local\...\Prizes.com, PE32 13->90 dropped 128 Drops PE files with a suspicious file extension 13->128 17 Prizes.com 33 13->17         started        21 cmd.exe 2 13->21         started        23 extrac32.exe 16 13->23         started        25 8 other processes 13->25 signatures7 process8 dnsIp9 92 t.me 149.154.167.99, 443, 49722 TELEGRAMRU United Kingdom 17->92 94 d3.7.4t.com 49.13.1.124, 443, 49723, 49724 HETZNER-ASDE Germany 17->94 106 Encrypted powershell cmdline option found 17->106 108 Tries to harvest and steal browser information (history, passwords, etc) 17->108 27 powershell.exe 22 17->27         started        31 chrome.exe 17->31         started        33 chrome.exe 17->33         started        36 23 other processes 17->36 signatures10 process11 dnsIp12 86 C:\Users\user\AppData\...\z1avasb3.cmdline, Unicode 27->86 dropped 118 Writes to foreign memory regions 27->118 120 Compiles code for process injection (via .Net compiler) 27->120 122 Creates a thread in another existing process (thread injection) 27->122 38 csc.exe 27->38         started        41 conhost.exe 27->41         started        124 Encrypted powershell cmdline option found 31->124 126 Suspicious execution chain found 31->126 96 192.168.2.4, 138, 443, 49709 unknown unknown 33->96 43 chrome.exe 33->43         started        88 C:\Users\user\AppData\Local\...\u12yb122.0.cs, Unicode 36->88 dropped 46 csc.exe 36->46         started        48 csc.exe 36->48         started        50 csc.exe 36->50         started        52 19 other processes 36->52 file13 signatures14 process15 dnsIp16 70 C:\Users\user\AppData\Local\...\z1avasb3.dll, PE32 38->70 dropped 54 cvtres.exe 38->54         started        104 www.google.com 74.125.137.104, 443, 49733, 49734 GOOGLEUS United States 43->104 72 C:\Users\user\AppData\Local\...\1frwuav5.dll, PE32 46->72 dropped 56 cvtres.exe 46->56         started        74 C:\Users\user\AppData\Local\...\olwtzpok.dll, PE32 48->74 dropped 58 cvtres.exe 48->58         started        76 C:\Users\user\AppData\Local\...\4plhxm2x.dll, PE32 50->76 dropped 60 cvtres.exe 50->60         started        78 C:\Users\user\AppData\Local\...\yka1qwao.dll, PE32 52->78 dropped 80 C:\Users\user\AppData\Local\...\ycktjpyr.dll, PE32 52->80 dropped 82 C:\Users\user\AppData\Local\...\viszixgf.dll, PE32 52->82 dropped 84 4 other files (none is malicious) 52->84 dropped 62 cvtres.exe 52->62         started        64 cvtres.exe 52->64         started        66 cvtres.exe 52->66         started        68 4 other processes 52->68 file17 process18
Threat name:
Win32.Spyware.Vidar
Status:
Suspicious
First seen:
2025-05-21 11:21:51 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
17 of 24 (70.83%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:da630d686e02fcfc0a26a312519f24c6 credential_access defense_evasion discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Obfuscated Files or Information: Command Obfuscation
Checks computer location settings
Executes dropped EXE
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Uses browser remote debugging
Detect Vidar Stealer
Vidar
Vidar family
Malware Config
C2 Extraction:
https://t.me/eom25t
https://steamcommunity.com/profiles/76561199855598339
Unpacked files
SH256 hash:
d79a3310cc4ed4855eacdbe9061403f8f40f2867c54705bbd74c6a122698ea39
MD5 hash:
a3f71b2ad4e55ec9aa063378ef563f82
SHA1 hash:
172585a483a34438de9b55ec93e03bb8eccb3246
SH256 hash:
7a5e3f11dfb0a6e2a3c9013def07c43eadcd89ec68407cc76b80e0c43cea4f5b
MD5 hash:
d2688df759d95b28825427fbe63b0deb
SHA1 hash:
55205bb0eead9f10fd36715a819cbdee0a49ce8e
Detections:
AutoIT_Compiled
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe d79a3310cc4ed4855eacdbe9061403f8f40f2867c54705bbd74c6a122698ea39

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::GetWindowsDirectoryW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments