General
-
Target
0b93575dd70b5c35fa71b07314f84746.zip
-
Size
1.9MB
-
Sample
250517-kp3kgsbq7s
-
MD5
ec3d9bc04d7ba1ce711608c2cf9dcd70
-
SHA1
bb9a88ba42f74064b30d4b96b5550b8220a0e409
-
SHA256
045002de0c280bbbf1fb4eba6239b89914a9f761f16396b623d623dbc0e5c456
-
SHA512
b1f7d7f60162972a46a50d3ac47cb6a2edd2879c8a545c2c9b72ccabaff97a725e5e1c2eb7348c3021c45b27a6cf46ba92246a90fc89242da4999d6906fdb6b5
-
SSDEEP
49152:ofdL0uVX6KaabbMNLlOvDKXRm6yAM2+FXLQ3/56g6IJ:olLR9w5M+XIj2+FbQ3/560
Static task
static1
Behavioral task
behavioral1
Sample
Вооtstrарреr/libcares-2.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
Вооtstrарреr/scripts/Dex.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
Вооtstrарреr/scripts/IY.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
Вооtstrарреr/scripts/Infinite Yield.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
Вооtstrарреr/scripts/UNC Check.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
Вооtstrарреr/scripts/UNCCheckEnv.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
Вооtstrарреr/Вооtstrарреr.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
vidar
13.8
70b1951e45faf96b545205e7862cea27
https://t.me/eom25t
https://steamcommunity.com/profiles/76561199855598339
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/135.0.0.0 Safari/537.36 OPR/120.0.0.0
Targets
-
-
Target
Вооtstrарреr/libcares-2.dll
-
Size
3.2MB
-
MD5
4164147a3225fdeb1a0ef43579e2b580
-
SHA1
391764a2ae094dbd54879cd46dff9e35207f6ec5
-
SHA256
78d91293dc4e7ec9a1bb87902454b6409c673e5cb2d86dbe65c51d87ae3cef0c
-
SHA512
4901ef94c56051cda3ceff25aca53d539c38a2a59a2c4788cc4e9842635919c94f1686ff2ff8da1e5641f1554dc851f075d3616873af176008f4cabcabbde5b8
-
SSDEEP
49152:24qTN+Q1YMyGNY8ZLijO90/9mx1B8yeTDYo8tFrGsEQttkgSwk:ApZv97PuTDYojR
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-
-
-
Target
Вооtstrарреr/scripts/Dex.lua
-
Size
410KB
-
MD5
e37374a8aa47cf8ac6d56901436e199f
-
SHA1
5d62f5db07614f3b548702faa4f7a06e235c9b12
-
SHA256
47cc5f1102fda0eba76b9570a1b943326f2170f270d5280e1f8dd5723c43fc14
-
SHA512
efee19e8109a48d49f099dd1767c722935123c4ea4d6e0ab905703e16fcb7196d31c45826d4398a5b7249e686ca90db3f671416909ce3440d4709edf1bd55775
-
SSDEEP
6144:X+B5OQiY5mqWM4Kg9HHj/B7TjmmDLmogQcEZVTkJuMap1PBPY9ZSnJm7xoiZDDHQ:RQ90qWM4Kg9HHj/B7TjHKi
Score3/10 -
-
-
Target
Вооtstrарреr/scripts/IY.txt
-
Size
480KB
-
MD5
69f23c9d75e7e51707aa64473b0e5642
-
SHA1
7e6d5eed5d792d0882c828d31965f26dc740588f
-
SHA256
efe338a26980378a7dcda54989425934cedf3b5db0df82f1e02f8c82d7003337
-
SHA512
5847ff81c9e3028710d944a69b66dda42bd71f8b512ddd6afd4942648e1185c6f045673de6299416633c8ee36446585fdf9c6bde286a35e39a22028681d5fa97
-
SSDEEP
6144:nkrLcE7j0LtUWRhp2HRFY91IBWQulO7tFo5n4XO9wDhoQhGZtUi8/1JVr4U48usx:nkrLcE9WrUbYoFOn4Xr+po
Score3/10 -
-
-
Target
Вооtstrарреr/scripts/Infinite Yield.lua
-
Size
464KB
-
MD5
b7fd97a54c618754ceab75e8a5c2de10
-
SHA1
feb96643a76f785177fa4e841b92e6a0af364180
-
SHA256
784f1c6ac0d4a3abdce59e09b0e9b52da6c426136cf0bfd775445e8194b77ddc
-
SHA512
078f305142e6b2d3300d249ba305897374e0d5a78e6db9ac902370b1eee433ee83322568735b3d82706fd1fc117dcbd3fe60ad5c2d8cada8deb36b2de6da7921
-
SSDEEP
6144:OkrLwE7/2eTtOWGhzWtRNY9gIBuQulO7oFo5n4Xd9wDhoQhGZtUi8/1j304U48uH:OkrLwE4WG6NYQFOn4Xyipo
Score3/10 -
-
-
Target
Вооtstrарреr/scripts/UNC Check.txt
-
Size
28KB
-
MD5
b76726d10354343d9af5c268e40b47c4
-
SHA1
7103c78071be0c65c8b3a217168cf7909aef748e
-
SHA256
e8d53406c916b8e827c65c8f00d8a18b1379e693fd0379e8116e749bdf860cf5
-
SHA512
5caffd8a06058e890fe4ae35430539281cf53fa791221189f0f6660778a83fa42cc3e5374ce06ff325420d92006c2bfe1003f1486714e889964075da66b046eb
-
SSDEEP
768:JopEYRzOKMrGrE7BWf9r+T+f9TkIuP4hUUsbU8FqQFBF5UXzRFEe3cSG5Sg/i5rx:JEKcZuy9p
Score3/10 -
-
-
Target
Вооtstrарреr/scripts/UNCCheckEnv.lua
-
Size
28KB
-
MD5
b76726d10354343d9af5c268e40b47c4
-
SHA1
7103c78071be0c65c8b3a217168cf7909aef748e
-
SHA256
e8d53406c916b8e827c65c8f00d8a18b1379e693fd0379e8116e749bdf860cf5
-
SHA512
5caffd8a06058e890fe4ae35430539281cf53fa791221189f0f6660778a83fa42cc3e5374ce06ff325420d92006c2bfe1003f1486714e889964075da66b046eb
-
SSDEEP
768:JopEYRzOKMrGrE7BWf9r+T+f9TkIuP4hUUsbU8FqQFBF5UXzRFEe3cSG5Sg/i5rx:JEKcZuy9p
Score3/10 -
-
-
Target
Вооtstrарреr/Вооtstrарреr.exe
-
Size
62KB
-
MD5
67653ba664e96633db899307cd07b56f
-
SHA1
09bd720cab2345c8d5e0c6bc4687ed3ee7fff0d4
-
SHA256
5c51dc904076cd5dc22fec10fa18563ef5283ebcfeec6f4bdc23a7504f1d5838
-
SHA512
43e67213f5aa9f989ba3038a7eff6bfa65dcec03356028499813e72ec5c6e4c7f1cb72445f9335670dd3c2b268cf8933d15a5d8d0b22761fa2b32274a7953100
-
SSDEEP
1536:vuQNkuJyUCn4TqWjcmGr8N5jiv5gjAuWgMW7Xye5xc:vrOj4TljcmGr8Ny5hvgMWLxxc
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Defense Evasion
Modify Authentication Process
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2