General
-
Target
https://www.mediafire.com/file/49cvufrqqhv4gqo/Ṕ@ṨṨḴḙyĦīṥẏḛ_Ṕ@ṨṨḴḙy_Setup3.rar/file
-
Sample
240701-bhv3dsvcpn
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/49cvufrqqhv4gqo/Ṕ@ṨṨḴḙyĦīṥẏḛ_Ṕ@ṨṨḴḙy_Setup3.rar/file
Resource
win10-20240404-en
windows10-1703-x64
16 signatures
150 seconds
Malware Config
Extracted
Family
vidar
Version
7.7
Botnet
c70f482a18aea356c95e9e64e49355be
C2
https://5.75.209.125
https://t.me/newagev
https://steamcommunity.com/profiles/76561199631487327
Attributes
-
profile_id_v2
c70f482a18aea356c95e9e64e49355be
Targets
-
-
Target
https://www.mediafire.com/file/49cvufrqqhv4gqo/Ṕ@ṨṨḴḙyĦīṥẏḛ_Ṕ@ṨṨḴḙy_Setup3.rar/file
Score10/10-
Detect Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-