MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f36fc8e0bb8eab645cf6b4876e588dc427575a4fb25db629598b29f1d9328756. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: f36fc8e0bb8eab645cf6b4876e588dc427575a4fb25db629598b29f1d9328756
SHA3-384 hash: b05391b1b5fa3963e2b952cbe0c8af79b36e92796d73bc0aa7137b7c8d93a9a8dd040dd10ab5b10531cc439ec8c5da7c
SHA1 hash: c9ad623744aea9196c90cb7b31408b20916d7b89
MD5 hash: 238ef24a5847077daa2bb119b43a1a76
humanhash: foxtrot-undress-beryllium-december
File name:238ef24a5847077daa2bb119b43a1a76.exe
Download: download sample
Signature Vidar
File size:236'544 bytes
First seen:2023-11-11 07:43:31 UTC
Last seen:2023-11-11 09:19:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 6144:58n+yOLNc4zZSvbH/44PtYNaBBeVJR8uCxA5axHU:2nPOpSvD/X+pJR8uRD
Threatray 2 similar samples on MalwareBazaar
TLSH T10934D020A0B9110AE2FACA7B8AA0F3D553767033770AC761EE42E6857C5D7C786C54B7
TrID 35.4% (.EXE) Win64 Executable (generic) (10523/12/4)
22.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.1% (.EXE) Win32 Executable (generic) (4505/5/1)
6.9% (.ICL) Windows Icons Library (generic) (2059/9)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe vidar

Intelligence


File Origin
# of uploads :
2
# of downloads :
306
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Creating a file
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Changing a file
Creating a file in the %AppData% subdirectories
Creating a window
Running batch commands
Launching the default Windows debugger (dwwin.exe)
Blocking the User Account Control
Stealing user critical data
Adding exclusions to Windows Defender
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables UAC (registry)
Drops script or batch files to the startup folder
Found evasive API chain (may stop execution after checking computer name)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1341034 Sample: t5p4kTG34O.exe Startdate: 11/11/2023 Architecture: WINDOWS Score: 100 110 yip.su 2->110 112 t.me 2->112 114 3 other IPs or domains 2->114 128 Found malware configuration 2->128 130 Malicious sample detected (through community Yara rule) 2->130 132 Antivirus detection for URL or domain 2->132 134 16 other signatures 2->134 10 t5p4kTG34O.exe 2 4 2->10         started        13 cmd.exe 2->13         started        15 cmd.exe 2->15         started        17 9 other processes 2->17 signatures3 process4 dnsIp5 146 Writes to foreign memory regions 10->146 148 Allocates memory in foreign processes 10->148 150 Adds a directory exclusion to Windows Defender 10->150 152 2 other signatures 10->152 20 CasPol.exe 15 128 10->20         started        25 powershell.exe 23 10->25         started        27 LwZ5cPcYYyS64KXFSpmAq6AP.exe 13->27         started        29 conhost.exe 13->29         started        31 yRdyXPNrFJ72KkGDg4mToFQ1.exe 15->31         started        33 conhost.exe 15->33         started        108 127.0.0.1 unknown unknown 17->108 35 ztwYzS6u5htWn0YkmKFFloca.exe 17->35         started        37 yXy4W3Eczy0ACiYztkCCR8Wf.exe 17->37         started        39 9 other processes 17->39 signatures6 process7 dnsIp8 116 194.49.94.48, 80 EQUEST-ASNL unknown 20->116 118 gobo14fc.top 158.160.127.22, 49711, 49715, 49721 DNIC-ASBLK-00721-00726US Venezuela 20->118 120 3 other IPs or domains 20->120 84 C:\Users\...\xtnA7QKU5IvIXOMlJe3NcUTx.exe, PE32 20->84 dropped 86 C:\Users\...\tvnzjJcIPvOdnHVRljivDO75.exe, PE32 20->86 dropped 88 C:\Users\...\s5OkBmxXmJi6aSE9QSQ2I66t.exe, PE32 20->88 dropped 90 78 other malicious files 20->90 dropped 136 Drops script or batch files to the startup folder 20->136 138 Creates HTML files with .exe extension (expired dropper behavior) 20->138 41 IRS8e8SOvKnFK0hTcVUWLHIZ.exe 37 20->41         started        46 UXp3m2TKRVSZTNrFxlkGOHLJ.exe 20->46         started        48 JlxVmdUWAphNpr3OGAfMlmcM.exe 20->48         started        58 15 other processes 20->58 50 conhost.exe 25->50         started        140 Detected unpacking (changes PE section rights) 27->140 142 Detected unpacking (overwrites its own PE header) 27->142 144 Machine Learning detection for dropped file 27->144 52 WerFault.exe 29->52         started        54 WerFault.exe 29->54         started        56 WerFault.exe 29->56         started        file9 signatures10 process11 dnsIp12 122 5.182.38.138 VMAGE-ASRU Russian Federation 41->122 124 t.me 149.154.167.99, 443, 49717 TELEGRAMRU United Kingdom 41->124 126 168.119.173.77, 2087, 49718 HETZNER-ASDE Germany 41->126 92 C:\Users\user\AppData\...\softokn3[1].dll, PE32 41->92 dropped 94 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 41->94 dropped 96 C:\Users\user\AppData\...\mozglue[1].dll, PE32 41->96 dropped 104 9 other files (5 malicious) 41->104 dropped 154 Detected unpacking (changes PE section rights) 41->154 156 Detected unpacking (overwrites its own PE header) 41->156 158 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 41->158 160 Found many strings related to Crypto-Wallets (likely being stolen) 41->160 60 cmd.exe 41->60         started        62 cmd.exe 41->62         started        64 WerFault.exe 41->64         started        98 C:\Users\user\AppData\...\softokn3[1].dll, PE32 46->98 dropped 100 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 46->100 dropped 102 C:\Users\user\AppData\...\mozglue[1].dll, PE32 46->102 dropped 106 3 other files (1 malicious) 46->106 dropped 162 Found evasive API chain (may stop execution after checking computer name) 46->162 66 cmd.exe 46->66         started        68 WerFault.exe 46->68         started        164 Tries to harvest and steal ftp login credentials 48->164 166 Tries to harvest and steal browser information (history, passwords, etc) 48->166 70 cmd.exe 48->70         started        168 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 58->168 file13 signatures14 process15 process16 72 conhost.exe 60->72         started        74 timeout.exe 60->74         started        76 conhost.exe 62->76         started        78 conhost.exe 66->78         started        80 timeout.exe 66->80         started        82 conhost.exe 70->82         started       
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-11-10 18:16:40 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery evasion spyware stealer trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
UAC bypass
Windows security bypass
Unpacked files
SH256 hash:
f36fc8e0bb8eab645cf6b4876e588dc427575a4fb25db629598b29f1d9328756
MD5 hash:
238ef24a5847077daa2bb119b43a1a76
SHA1 hash:
c9ad623744aea9196c90cb7b31408b20916d7b89
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

Executable exe f36fc8e0bb8eab645cf6b4876e588dc427575a4fb25db629598b29f1d9328756

(this sample)

  
Delivery method
Distributed via web download

Comments