Windows
Analysis Report
random(2).exe
Overview
General Information
Detection
Vidar
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Attempt to bypass Chrome Application-Bound Encryption
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Vidar stealer
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Entry point lies outside standard sections
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Browser Started with Remote Debugging
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Classification
- System is w10x64
random(2).exe (PID: 6980 cmdline:
"C:\Users\ user\Deskt op\random( 2).exe" MD5: 5E941E7C271E85093CB8344FB7CAB50B) chrome.exe (PID: 7804 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 8048 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2296,i ,999768806 8787143346 ,174710115 6879609282 6,262144 - -variation s-seed-ver sion=20250 306-183004 .429000 -- mojo-platf orm-channe l-handle=2 464 /prefe tch:3 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 3436 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 4968 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 512 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 1532 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6768 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 4056 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security |
System Summary |
---|
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-19T14:00:17.957230+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 78.47.63.132 | 443 | 192.168.2.10 | 49685 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-19T14:00:20.590469+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 78.47.63.132 | 443 | 192.168.2.10 | 49686 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-19T14:00:20.590290+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.2.10 | 49686 | 78.47.63.132 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-19T14:00:28.067428+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49694 | 78.47.63.132 | 443 | TCP |
2025-03-19T14:02:16.338105+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49699 | 78.47.63.132 | 443 | TCP |
2025-03-19T14:02:16.739083+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49700 | 78.47.63.132 | 443 | TCP |
2025-03-19T14:02:17.804395+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49701 | 78.47.63.132 | 443 | TCP |
2025-03-19T14:02:19.840485+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49702 | 78.47.63.132 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-19T14:02:16.739083+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49700 | 78.47.63.132 | 443 | TCP |
2025-03-19T14:02:17.804395+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49701 | 78.47.63.132 | 443 | TCP |
2025-03-19T14:02:19.840485+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49702 | 78.47.63.132 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-19T14:00:14.506040+0100 | 2859378 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49683 | 78.47.63.132 | 443 | TCP |
- • AV Detection
- • Compliance
- • Spreading
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Data Obfuscation
- • Boot Survival
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |