MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 debb57db92baf46b2a5da46fdefb94bc9407e34c5d4e67056c66d446a309fb34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: debb57db92baf46b2a5da46fdefb94bc9407e34c5d4e67056c66d446a309fb34
SHA3-384 hash: 4119b5de199df95cea8778a373cae56ff14309bc19c805125f222cf257bb8907a3615dcc7bbd0de92fd56a6960bcbca1
SHA1 hash: 9528cd7f97fe015475e49322a146bade658c87aa
MD5 hash: 2973fab86f4eb1102e61d1797b4b6b2d
humanhash: hot-pluto-fourteen-yellow
File name:file
Download: download sample
Signature Vidar
File size:346'112 bytes
First seen:2026-05-05 22:02:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash af3d62cde427ca48a4dc560b530bd0a3 (1 x Vidar)
ssdeep 6144:VKO/kYzo0AbHhUMrhSdctdX482CkEB2CkE4CkEsCSH0ZhzkHo:YO/rFAbBUyhSdGfSH0ZhAI
TLSH T152741938D3B4A3ACDD61D474889B6313D0A07D4982185AB7A7FA4FF17E23655F03E229
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:exe upx-dec vidar


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 1a95ff2e162115cec3cd39d36ae3b69ee6fb078c06053207a75a22ae7bc2c85f
File size (compressed) :173'568 bytes
File size (de-compressed) :346'112 bytes
Format:win64/pe
Packed file: 1a95ff2e162115cec3cd39d36ae3b69ee6fb078c06053207a75a22ae7bc2c85f

Intelligence


File Origin
# of uploads :
1
# of downloads :
154
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_debb57db92baf46b2a5da46fdefb94bc9407e34c5d4e67056c66d446a309fb34.exe
Verdict:
No threats detected
Analysis date:
2026-05-05 22:03:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sending a custom TCP request
DNS request
Сreating synchronization primitives
Behavior that indicates a threat
Connection attempt to an infection source
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-05-05T19:13:00Z UTC
Last seen:
2026-05-07T17:30:00Z UTC
Hits:
~100
Detections:
Trojan-PSW.Win64.Vidar.wp Trojan-PSW.Vidar.HTTP.C&C Trojan-PSW.Stealerc.TCP.C&C Trojan-PSW.Stealerc.HTTP.C&C Trojan-PSW.Lumma.TCP.C&C Trojan-Banker.Bandra.TCP.C&C PDM:Trojan.Win32.Generic
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Early bird code injection technique detected
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Monitors registry run keys for changes
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1909080 Sample: file.exe Startdate: 06/05/2026 Architecture: WINDOWS Score: 100 51 mne.hidayahnetwork.com 2->51 53 telegram.me 2->53 55 one.one.one.one 2->55 85 Suricata IDS alerts for network traffic 2->85 87 Multi AV Scanner detection for submitted file 2->87 89 Yara detected Vidar stealer 2->89 91 Joe Sandbox ML detected suspicious sample 2->91 8 file.exe 1 14 2->8         started        12 msedge.exe 13 111 2->12         started        14 msedge.exe 2->14         started        16 2 other processes 2->16 signatures3 process4 dnsIp5 57 mne.hidayahnetwork.com 172.67.194.13, 443, 49697, 49698 CLOUDFLARENETUS United States 8->57 59 telegram.me 149.154.167.99, 443, 49696 TELEGRAMRU United Kingdom 8->59 93 Early bird code injection technique detected 8->93 95 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 8->95 97 Found many strings related to Crypto-Wallets (likely being stolen) 8->97 99 9 other signatures 8->99 18 msedge.exe 2 11 8->18         started        21 msedge.exe 8->21         started        23 chrome.exe 8->23         started        30 3 other processes 8->30 61 192.168.2.5, 138, 443, 49675 unknown unknown 12->61 63 239.255.255.250 unknown Reserved 12->63 25 msedge.exe 12->25         started        32 2 other processes 12->32 65 192.168.2.4 unknown unknown 14->65 67 192.168.2.6 unknown unknown 14->67 28 msedge.exe 14->28         started        34 3 other processes 14->34 36 2 other processes 16->36 signatures6 process7 dnsIp8 83 Monitors registry run keys for changes 18->83 38 msedge.exe 18->38         started        40 msedge.exe 21->40         started        42 chrome.exe 23->42         started        69 part-0042.t-0009.fb-t-msedge.net 13.107.226.70, 443, 49722 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 25->69 71 150.171.110.146, 443, 49729 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 25->71 77 4 other IPs or domains 25->77 73 ax-0002.ax-msedge.net 150.171.27.11, 443, 49731, 49800 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->73 75 150.171.29.11, 443, 49739, 49740 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->75 45 firefox.exe 30->45         started        47 msedge.exe 30->47         started        49 chrome.exe 30->49         started        signatures9 process10 dnsIp11 79 www.google.com 142.251.154.119, 443, 49717 GOOGLEUS United States 42->79 81 127.0.0.1 unknown unknown 45->81
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Midie
Status:
Malicious
First seen:
2026-05-05 22:02:35 UTC
File Type:
PE+ (Exe)
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
debb57db92baf46b2a5da46fdefb94bc9407e34c5d4e67056c66d446a309fb34
MD5 hash:
2973fab86f4eb1102e61d1797b4b6b2d
SHA1 hash:
9528cd7f97fe015475e49322a146bade658c87aa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe debb57db92baf46b2a5da46fdefb94bc9407e34c5d4e67056c66d446a309fb34

(this sample)

Comments