| File name: | TradingView Desktop (Pro+).zip |
| Full analysis: | https://app.any.run/tasks/7a2dcff1-5c59-4f72-ab44-52bd55b0f578 |
| Verdict: | Malicious activity |
| Threats: | Vidar is a dangerous malware that steals information and cryptocurrency from infected users. It derives its name from the ancient Scandinavian god of Vengeance. This stealer has been terrorizing the internet since 2018. |
| Analysis date: | June 19, 2024, 12:10:57 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | 98F307821BF3FA62F416299785DFEB34 |
| SHA1: | B7BAFC393A7E3D3A2038881833A53BB804E58944 |
| SHA256: | ECA62135DA01C30871FF5F804E3C5AF01AFEF2849C8FA6A45FE81351645780B6 |
| SSDEEP: | 98304:Rhkai+J965iqYD1VweHM9pqMJScQeLwVmJjOPgFe2LJz4OrwuxuwSCwTs7vmn+zg:VY+f9tUa974iK7TJgQ7xA |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:04:10 18:29:28 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | SDK/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 880 | "C:\Users\admin\Desktop\MBSetup.exe" | C:\Users\admin\Desktop\MBSetup.exe | — | explorer.exe | |||||||||||
User: admin Company: Malwarebytes Integrity Level: MEDIUM Description: Malwarebytes Setup Exit code: 3221226540 Version: 5.1.5.90 Modules
| |||||||||||||||
| 1476 | "C:\Users\admin\Desktop\HitmanPro.exe" | C:\Users\admin\Desktop\HitmanPro.exe | — | explorer.exe | |||||||||||
User: admin Company: Sophos B.V. Integrity Level: MEDIUM Description: HitmanPro 3.8 Exit code: 3221226540 Version: 3, 8, 34, 330 Modules
| |||||||||||||||
| 2036 | "C:\Users\admin\Desktop\TradingView Desktop (Pro+).exe" | C:\Users\admin\Desktop\TradingView Desktop (Pro+).exe | explorer.exe | ||||||||||||
User: admin Company: Igor Pavlov Integrity Level: MEDIUM Description: 7-Zip Shell Extension Exit code: 0 Version: 24.01 Modules
Vidar(PID) Process(2036) TradingView Desktop (Pro+).exe C2https://t.me/r8z0l URLhttps://steamcommunity.com/profiles/76561199698764354 RC42910114286690104117195131148 Strings (316)GetProcAddress LoadLibraryA lstrcatA OpenEventA CreateEventA CloseHandle Sleep GetUserDefaultLangID VirtualAllocExNuma VirtualFree GetSystemInfo VirtualAlloc HeapAlloc GetComputerNameA lstrcpyA GetProcessHeap GetCurrentProcess lstrlenA ExitProcess GlobalMemoryStatusEx GetSystemTime SystemTimeoFileTime advapi32.dll gdi32.dll user32.dll crypt32.dll ntdll.dll GetUserNameA CreateDCA GetDeviceCaps ReleaseDC CryptStringToBinaryA sscanf NtQueryInformationProcess VMwareVMware HAL9TH JohnDoe DISPLAY %hu/%hu/%hu GetEnvironmentVaribleA GetFileAttributesA GlobalLock HeapFree GetFileSize GlobalSize CreateToolhelp32Snpshot IsWow64Process Process32Next GetLocalTime FreeLibrary GetTimeZoneInformation GetSystemPowerStatus GetVolumeInformationA GetWindowsDirectoryA Process32First GetLocaleInfoA GetUserDefaultLocaleName GetModuleFileNameA DeleteFileA FindNextFileA LocalFree FindClose SetEnvironmentVaribleA LocalAlloc GetFileSizeEx ReadFile SetFilePointer WriteFile CreateFileA FindFirstFileA CopyFileA VirtualProtect GetLogicalProcessorInformaionEx GetLastError lstrcpynA MultiByteToWideChar GlobalFree WideCharToMultiByte GlobalAlloc OpenProcess TerminateProcess GetCurrentProcessId gdiplus.dll ole32.dll bcrypt.dll wininet.dll shlwapi.dll shell32.dll psapi.dll rstrtmgr.dll CreateCompatibleBitmap SelectObject BitBlt DeleteObject CreateCompatibleDC GdipGetImageEncodersSize GdipGetImageEncoders GdipCreateBitmapFromHBITMAP GdiplusStartup GdiplusShutdown GdipSaveImageToStream GdipDisposeImage GdipFree GetHGlobalFromStrem CreateStreamOnHGlobal CoUninitialize CoInitialize CoCreateInstance BCryptGenerateSymmetricKey BCryptCloseAlgorithmProvider BCryptDecrypt BCryptSetProperty BCryptDestroyKey BCryptOpenAlgorithmProvider GetWindowRect GetDesktopWindow GetDC CloseWindow wsprintfA EnumDisplayDevicesA GetKeyboardLayoutList CharToOemW wsprintfW RegQueryValueExA RegEnumKeyExA RegOpenKeyExA RegCloseKey RegEnumValueA CryptBinaryToStringA CryptUnprotectData SHGetFolderPathA ShellExecuteExA InternetOpenUrlA InternetConnectA InternetCloseHandle InternetOpenA HttpSendRequestA HttpOpenRequestA InternetReadFile InternetCrackUrA StrCmpCA StrStrA StrCmpCW PathMatchSpecA GetModuleFileNameExA RmStartSession RmRegisterResources RmGetList RmEndSession sqlite3_open sqlite3_prepare_v2 sqlite3_step sqlite3_column_text sqlite3_finalize sqlite3_close sqlite3_column_bytes sqlite3_column_blob encrypted_key PATH C:\\ProgramData\\nss3.dll NSS_Init NSS_Shutdown PK11_GetInternaKeySlot PK11_FreeSlot PK11_Authenticate PK11SDR_Decrypt C:\\ProgramData\\ SELECT origin_url, username_value, password_value FROM logins Soft: profile: Host: Login: Password: Opera OperaGX Network Cookies .txt TRUE SELECT HOS_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies FALSE Autofill SELECT name, vaue FROM auofill History SELECT url FROM urls LIMIT 1000 CC Name: SELECT name_on_card, expiration_month, expirtion_year, card_number_encrypted FROM credit_cards Month: Year: Card: Cookies Login Data Web Data History logins.json formSubmitURL usernameField encryptedUsername encryptedPassword guid SELECT host, isHttpOnly, path, isSecur, expiry, name, value FROM moz_cookies SELECT fieldname, value FROM moz_formhistory SELECT url FROM moz_places LIMIT 1000 cookies.sqlite formhistory.sqlite places.sqlite Plugins Local Extension Settings Sync Extension Settings IndexedDB Opera Stable Opera GX Stable CURRENT chrome-extension_ _0.indexeddb.leveldb Local State profiles.ini chrome opera firefox Wallets %08lX%04lX%lu SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion ProductName x32 x64 %d/%d/%d %d:%d:%d DisplayName HARDWARE\\DESCRIPTION\\Sysem\\CentralProcessor\\0 ProcessorNameString SOFTWARE\\Microsoft\\Windows\\CurrentVrsion\\Uninstall DisplayVersion freebl3.dll mozglue.dll msvcp140.dll nss3.dll softokn3.dll vcruntime140.dl \\Temp\\ .exe runas open /c start %DESKTOP% %APPDATA% %LOCALAPPDATA% %USERPROFILE% %DOCUMENTS% %PROGRAMFILES% %PROGRAMFILES_86% %RECENT% *.lnk Files \\discord\\ \\Local Storage\\leveldb\\CURRENT \\Local Storage\\leveldb \\Telegram Desktop\\ key_datas D877F783D5D3EF8C* map* A7FDF864FBC10B77* A92DAA6EA6F891F2* F8806DD0C461824F* Telegram Tox *.tox *.ini Password \\Outlook\\accounts.txt Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\ Pidgin Software\\Microsoft\\Office\\13.\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\ Software\\Microsoft\\Office\\14.\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\ Software\\Microsoft\\Office\15.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\ \\.purple\\ Software\\Microsoft\\Office\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\ accounts.xml Software\\Microsoft\\Windows Messaging Subsystem\\Profiles\\9375CFF0413111d3B88A00104B2A6676\\ 00000001 00000002 00000003 00000004 dQw4w9WgXcQ token: Software\\Valve\\Steam SteamPath \\config\\ ssfn* config.vdf DialogConfig.vdf DialogConfigOverlay*.vdf libraryfolders.vdf loginusers.vdf \\Steam\\ sqlite3.dll browsers done Soft \\Discord\\tokens.txt /c timeout /t 5 & del /f /q " " & del "C:\\ProgrmData\\*.dll"" & xit C:\\Windows\\system32\\cmd.exe https Content-Type: multipart/form-data; boundary=---- POST HTTP/1.1 Content-Disposition: form-data; name=" hwid build token file_name file message ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 screenshot.jpg | |||||||||||||||
| 2736 | "C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe" | C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe | services.exe | ||||||||||||
User: SYSTEM Company: Malwarebytes Integrity Level: SYSTEM Description: Malwarebytes Installer Service Version: 5.1.0.152 Modules
| |||||||||||||||
| 2816 | "C:\Program Files\HitmanPro\hmpsched.exe" | C:\Program Files\HitmanPro\hmpsched.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Sophos B.V. Integrity Level: SYSTEM Description: HitmanPro Scheduler Version: 3, 8, 34, 330 Modules
| |||||||||||||||
| 2904 | "C:\Users\admin\Desktop\MBSetup.exe" | C:\Users\admin\Desktop\MBSetup.exe | explorer.exe | ||||||||||||
User: admin Company: Malwarebytes Integrity Level: HIGH Description: Malwarebytes Setup Version: 5.1.5.90 Modules
| |||||||||||||||
| 3416 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\TradingView Desktop (Pro+).zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 4008 | timeout /t 10 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 4044 | "C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\admin\Desktop\TradingView Desktop (Pro+).exe" & rd /s /q "C:\ProgramData\BFIDGHDBAFIJ" & exit | C:\Windows\System32\cmd.exe | — | TradingView Desktop (Pro+).exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 4068 | "C:\Users\admin\Desktop\HitmanPro.exe" | C:\Users\admin\Desktop\HitmanPro.exe | explorer.exe | ||||||||||||
User: admin Company: Sophos B.V. Integrity Level: HIGH Description: HitmanPro 3.8 Version: 3, 8, 34, 330 Modules
| |||||||||||||||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\TradingView Desktop (Pro+).zip | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3416) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2736 | MBAMInstallerService.exe | C:\Windows\TEMP\MBInstallTemp9761b1e52e3511ef9dd612a9866c77de\ctlrpkg.7z | — | |
MD5:— | SHA256:— | |||
| 2036 | TradingView Desktop (Pro+).exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\07AYU4MA.txt | text | |
MD5:92C28909CADEF6E27BD0FEEC33C5A39F | SHA256:D9034532CFAD254977947973011D1EE4E0619C937F6C40240642B527AC2F2615 | |||
| 4068 | HitmanPro.exe | C:\Program Files\HitmanPro\HitmanPro.exe | executable | |
MD5:FF0110F94315A6EE213B498CDDC6FE45 | SHA256:FF5D3A2B3202490937FDCC6FF8A645FCB4E7A0EBE87BB4638BF1FA602BFEF7BA | |||
| 4068 | HitmanPro.exe | C:\Users\Public\Desktop\HitmanPro.lnk | binary | |
MD5:7B6135618FC502FE77410FB2343F57B1 | SHA256:B7111F4B90E49ECDC018751E985D21F327208D22CA435C6AE21F6373E501DAC6 | |||
| 2904 | MBSetup.exe | C:\Windows\system32\drivers\mbamtestfile.dat | text | |
MD5:9F06243ABCB89C70E0C331C61D871FA7 | SHA256:837CCB607E312B170FAC7383D7CCFD61FA5072793F19A25E75FBACB56539B86B | |||
| 4068 | HitmanPro.exe | C:\Windows\system32\drivers\hitmanpro37.sys | executable | |
MD5:F92E1D5078594FED58A75ABC3AF051DA | SHA256:680AF4704F11F438557526085DBC1F63AED705BDB458B00D7C1FE767B9690492 | |||
| 2736 | MBAMInstallerService.exe | C:\Windows\TEMP\MBInstallTemp9761b1e52e3511ef9dd612a9866c77de\servicepkg.7z | compressed | |
MD5:69143544A7404DDDABFC296C036EAAB5 | SHA256:BE426976B48ED6DE489FDF096C28AC958CBC940F88B7A982BB4E4A408A86307A | |||
| 2036 | TradingView Desktop (Pro+).exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\76561199698764354[1].htm | html | |
MD5:551D8B9E7B7A719EF3F30E9EFDE5C9CC | SHA256:C845DF0BF497F1C7A3D3DC521855D5C106497277AB80201709D4F57FA4A04C95 | |||
| 4068 | HitmanPro.exe | C:\ProgramData\HitmanPro\Remnants.bin | pgc | |
MD5:74ABC8B7ED0A0BD33DEB0A41274143A7 | SHA256:7070A19D8F3E0238443FCB59AFA154759E75658A7F25C2D3B5FEB66F4925DFFF | |||
| 2904 | MBSetup.exe | C:\Program Files\mbamtestfile.dat | text | |
MD5:9F06243ABCB89C70E0C331C61D871FA7 | SHA256:837CCB607E312B170FAC7383D7CCFD61FA5072793F19A25E75FBACB56539B86B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1372 | svchost.exe | GET | 304 | 87.248.205.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33 | unknown | — | — | unknown |
4068 | HitmanPro.exe | HEAD | 200 | 185.105.204.28:80 | http://files.surfright.nl/HitmanPro.exe | unknown | — | — | unknown |
1060 | svchost.exe | GET | 304 | 178.79.238.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75 | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 23.205.255.43:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
4068 | HitmanPro.exe | GET | 200 | 52.174.35.5:80 | http://scan.hitmanpro.com/banner.aspx?lc=en&v=3.8.34.330&c= | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 23.203.41.221:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
4068 | HitmanPro.exe | GET | 200 | 87.248.205.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?47637e48e6220c9e | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1372 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1060 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1372 | svchost.exe | 87.248.205.0:80 | ctldl.windowsupdate.com | LLNW | US | unknown |
1372 | svchost.exe | 23.205.255.43:80 | crl.microsoft.com | AKAMAI-AS | DE | unknown |
1372 | svchost.exe | 23.203.41.221:80 | www.microsoft.com | AKAMAI-AS | US | unknown |
1060 | svchost.exe | 178.79.238.0:80 | ctldl.windowsupdate.com | LLNW | FR | unknown |
2036 | TradingView Desktop (Pro+).exe | 149.154.167.99:443 | t.me | Telegram Messenger Inc | GB | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
t.me |
| whitelisted |
steamcommunity.com |
| whitelisted |
files.surfright.nl |
| whitelisted |
scan.hitmanpro.com |
| unknown |
api2.amplitude.com |
| whitelisted |
ark.mwbsys.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2036 | TradingView Desktop (Pro+).exe | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |