MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ddd22d09ad72e3f85df114c4f899c52dc194a45896ec661bc119fe20b0b5fb27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 7


Intelligence 7 IOCs YARA 8 File information Comments

SHA256 hash: ddd22d09ad72e3f85df114c4f899c52dc194a45896ec661bc119fe20b0b5fb27
SHA3-384 hash: b3dac76a0ba9a5adcecd19b85936c0da12885eeefbd37f93daceb17e9609366e2757b140a17712326b7ad321cbe094f3
SHA1 hash: 5fdd978a34eded4b8e655b650b3ee5bd5a8cedea
MD5 hash: faea2166d539677cfb5f749ee521f06c
humanhash: violet-william-pennsylvania-three
File name:Setup.msi
Download: download sample
Signature Vidar
File size:2'115'072 bytes
First seen:2024-12-15 19:32:42 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 49152:fgKV8cU7Y4zG3knHeVdOEod5+1d7csiG/CZnB:v4GYHeVdPod577B
TLSH T19EA5AE11B3CAC236E16E01BBE829EE0AE139BD67033081D763E6755E1E718C1577EB52
TrID 80.0% (.MSI) Microsoft Windows Installer (454500/1/170)
10.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
7.8% (.MSP) Windows Installer Patch (44509/10/5)
1.4% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter smica83
Tags:HUN KmsPico msi signed vidar

Code Signing Certificate

Organisation:KmsPico
Issuer:KmsPico
Algorithm:sha256WithRSAEncryption
Valid from:2024-12-05T04:46:50Z
Valid to:2025-12-05T05:06:50Z
Serial number: 1cf7408e120073884d24a079a41ad246
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 82bfa2092c336259d5fe158d6fe5c8d92c9c1b5dda0c30244a3e4525dcbb0650
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
shellcode emotet shell sage
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
adaptive-context cmd fingerprint keylogger lolbin msiexec remote
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575513 Sample: Setup.msi Startdate: 15/12/2024 Architecture: WINDOWS Score: 100 79 sedone.online 2->79 81 t.me 2->81 83 2 other IPs or domains 2->83 99 Suricata IDS alerts for network traffic 2->99 101 Found malware configuration 2->101 103 Multi AV Scanner detection for dropped file 2->103 105 5 other signatures 2->105 13 msiexec.exe 82 34 2->13         started        17 msiexec.exe 12 2->17         started        signatures3 process4 file5 63 C:\Windows\Installer\MSI59E3.tmp, PE32+ 13->63 dropped 65 C:\Windows\Installer\MSI5760.tmp, PE32 13->65 dropped 67 C:\Windows\Installer\MSI56D2.tmp, PE32 13->67 dropped 75 2 other malicious files 13->75 dropped 125 Drops executables to the windows directory (C:\Windows) and starts them 13->125 19 MSI59E3.tmp 1 13->19         started        21 msiexec.exe 13->21         started        23 msiexec.exe 13->23         started        69 C:\Users\user\AppData\Local\...\MSI9279.tmp, PE32 17->69 dropped 71 C:\Users\user\AppData\Local\...\MSI9249.tmp, PE32 17->71 dropped 73 C:\Users\user\AppData\Local\...\MSI918D.tmp, PE32 17->73 dropped 77 4 other malicious files 17->77 dropped signatures6 process7 process8 25 script.exe 8 30 19->25         started        dnsIp9 91 page-yoda.sbs 104.21.52.25, 49738, 80 CLOUDFLARENETUS United States 25->91 59 C:\Users\user\AppData\Local\Temp\putt.exe, PE32 25->59 dropped 61 C:\Users\user\AppData\Local\...\lem[1].exe, PE32 25->61 dropped 117 Found many strings related to Crypto-Wallets (likely being stolen) 25->117 119 Loading BitLocker PowerShell Module 25->119 121 Reads the Security eventlog 25->121 123 Reads the System eventlog 25->123 30 putt.exe 29 25->30         started        33 conhost.exe 25->33         started        35 WmiPrvSE.exe 1 25->35         started        file10 signatures11 process12 signatures13 127 Multi AV Scanner detection for dropped file 30->127 37 cmd.exe 30->37         started        process14 file15 57 C:\Users\user\AppData\...\Corrections.com, PE32 37->57 dropped 107 Drops PE files with a suspicious file extension 37->107 41 Corrections.com 37->41         started        45 conhost.exe 37->45         started        47 tasklist.exe 37->47         started        49 7 other processes 37->49 signatures16 process17 dnsIp18 93 sedone.online 116.203.12.241, 443, 49787, 49792 HETZNER-ASDE Germany 41->93 95 t.me 149.154.167.99, 443, 49781 TELEGRAMRU United Kingdom 41->95 97 127.0.0.1 unknown unknown 41->97 109 Attempt to bypass Chrome Application-Bound Encryption 41->109 111 Found many strings related to Crypto-Wallets (likely being stolen) 41->111 113 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 41->113 115 3 other signatures 41->115 51 chrome.exe 41->51         started        signatures19 process20 dnsIp21 85 192.168.2.4, 138, 443, 49672 unknown unknown 51->85 87 239.255.255.250 unknown Reserved 51->87 54 chrome.exe 51->54         started        process22 dnsIp23 89 www.google.com 142.250.181.132, 443, 49837, 49839 GOOGLEUS United States 54->89
Threat name:
Win32.Trojan.Sonbokli
Status:
Malicious
First seen:
2024-12-15 19:33:05 UTC
File Type:
Binary (Archive)
Extracted files:
45
AV detection:
6 of 38 (15.79%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery persistence privilege_escalation spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Access Token Manipulation: Create Process with Token
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Checks installed software on the system
Drops file in Program Files directory
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Enumerates processes with tasklist
Blocklisted process makes network request
Downloads MZ/PE file
Enumerates connected drives
Reads data files stored by FTP clients
Unsecured Credentials: Credentials In Files
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_LATAM_MSI_Banker
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:suspicious_msi_file
Author:Johnk3r
Description:Detects common strings, DLL and API in Banker_BR

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments