Trojan.Vidar.PA
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Vidar.PA |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
2d41ebc2d5e1161f4eb664e0280c6ca9
SHA1:
6dff753c979b5e0f4f3a516a1f7d7e88c170e690
SHA256:
3E1ADC6172DB73A351FB172C3D8B4443D44A67073076EB4ED38FB59866136A9D
File Size:
4.12 MB, 4124792 bytes
|
|
MD5:
1810194faba0a07a9c6e18bc9b1f4624
SHA1:
5577cde90be63c5dd58f93346c1a1c973e66fc35
SHA256:
BCB724C6910E8544A409EA4B61834C7161257BB31B087F5F1FA01A53A1954A20
File Size:
3.27 MB, 3269536 bytes
|
|
MD5:
c3d802eeea9816602ba0670aad62e777
SHA1:
ea9695e9a3cce8ea356e94096b767b0816c07a19
SHA256:
D46ED2CC61B0FB1369A2406D775CF5C99F3DD54846CFB2A7DC6D4562A15D77BA
File Size:
3.08 MB, 3076024 bytes
|
|
MD5:
a35cb62d1d241c9ed9e0738a51c8ec74
SHA1:
6cad37bec5246e7194dbc2f3ea77c47046a35c9b
SHA256:
32F5E5A1332F76A6F4E637CFB7528E8D516E85FCED46EBE10926DB967FBE9C90
File Size:
4.71 MB, 4706845 bytes
|
|
MD5:
086bf0556272cae519785fae8b992b7d
SHA1:
b3c0cca6f6f57855552a23e02278c04af98701ff
SHA256:
575FB671213AAF40E86AEC096266FF2CB3D9383D65D728BF05393D108F7A6C37
File Size:
4.13 MB, 4128536 bytes
|
Show More
|
MD5:
097a64ac9d491a6ee735d069aa7489d1
SHA1:
4e32ca91f0d950c65e0fa4b8737e847c7cbc6df5
SHA256:
42897ED16D70F0DC3DE5EFCDD128587D45DF7C0670DDFBDA6599F478613CC17D
File Size:
3.67 MB, 3667984 bytes
|
|
MD5:
ff4620335553484168b82e782c781bb1
SHA1:
4e4b6ca955137e2489ae6281e8dd360cb5b23c9e
SHA256:
B24634D6A8B696B0832FBF36C540E7D7784C718C9F84D0EA319D65D586C3CFD5
File Size:
3.15 MB, 3151064 bytes
|
|
MD5:
ff4db66e1022dfe7b2cd6bdc17b0fd2a
SHA1:
013d111e9bbc240a5a61a150aa5ab6fd06da0d4c
SHA256:
2D326606F171968EAEA04148C9F400C110D4DA9EA45F03C22EA587DABD94AB31
File Size:
3.17 MB, 3169920 bytes
|
|
MD5:
fb6ee675e00ac06cdbb999ba0bf24abd
SHA1:
288273e3f7b8d2cffe15ac3e28d89534ca502e66
SHA256:
B92B9A7C3BD5F74CF88E0CDE5450D379ABE80BD70531F0EF55BEA2D33FF06885
File Size:
5.47 MB, 5467024 bytes
|
|
MD5:
5fb7a9f8c8be40b52d301be32ca36d9e
SHA1:
5a3cf7934aa7c3bc6a469d7efb16e6734a1d0e17
SHA256:
2CABFFF71DEDFEEECBD29CAF71BB676544E5498D0F4B80CCF3A20584FE92536D
File Size:
5.50 MB, 5504400 bytes
|
|
MD5:
2611455095eadc2992c97430598072a1
SHA1:
8def8d87cb50d8ddda7ad2d240e5e3021d28dc74
SHA256:
4E2FB945C54452681571025981351AAFDBFC2B821125C3E43C6852BDE308D1BC
File Size:
4.76 MB, 4761672 bytes
|
|
MD5:
f9230721d45c1c432cd8cf3b75ec96af
SHA1:
c1aebec3d473b10cd7c90060afc4ea845277c2ad
SHA256:
D1B7B1D6B460043E0DB9466C07CA48C529FD5134FED04023DACC1F9494CD2C0D
File Size:
3.66 MB, 3663888 bytes
|
|
MD5:
228405636c683ea49c21ce1139397978
SHA1:
a30eeae8ba14a3a2227f30265042dff7c789205a
SHA256:
096249C0A08DF8ABC0D198B29F09E30152FB57ACFD7125E7CF8524B9221919DA
File Size:
6.52 MB, 6517992 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is 32-bit executable
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
|
| I S Internal Description | Setup Launcher Unicode |
| I S Internal Version | 30.0.233 |
| Internal Build Number | 214356 |
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks | VOVSOFT |
| Original Filename |
|
| Product Name |
Show More
|
| Product Version |
Show More
|
| Program I D | com.vovsoft.vcfeditor |
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| FATİH RAMAZAN ÇIKAN | Certum Code Signing 2021 CA | Hash Mismatch |
| Virtual Desktop, Inc | DigiCert Global G3 Code Signing ECC SHA384 2021 CA1 | Hash Mismatch |
| Epic Games Inc. | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 | Hash Mismatch |
| Sony Interactive Entertainment LLC | DigiCert Trusted Root G4 | Hash Mismatch |
| 深圳市创想三维科技股份有限公司 | DigiCert Trusted Root G4 | Hash Mismatch |
Show More
| DeepL SE | GlobalSign Code Signing Root R45 | Hash Mismatch |
| LTQ DIGITAL LIMITED COMPANY | GlobalSign GCC R45 EV CodeSigning CA 2020 | Hash Mismatch |
| Huang Qinyin | SSL.com Code Signing Intermediate CA ECC R2 | Hash Mismatch |
| Raise 3D Technologies, Inc. | Sectigo Public Code Signing Root R46 | Hash Mismatch |
| domotz inc | Sectigo Public Code Signing Root R46 | Hash Mismatch |
File Traits
- golang
- Installer Version
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 4,706 |
|---|---|
| Potentially Malicious Blocks: | 1,107 |
| Whitelisted Blocks: | 3,599 |
| Unknown Blocks: | 0 |
Visual Map
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.FRFC
- Agent.IDA
- Agent.JFH
- Agent.JFJ
- Agent.KOFA
Show More
- Agent.TKJ
- ClipBanker.KF
- CobaltStrike.FZ
- Coinminer.GABB
- Coinminer.LO
- Coinminer.RQ
- Dropper.FF
- Dropper.FFB
- Dropper.JA
- Dropper.JD
- Filecoder.EY
- Filecoder.GFD
- Filecoder.JKB
- Gamehack.OFA
- Goshell.E
- Kryptik.GSH
- Marte.FE
- Quasar.BC
- Quasar.BCA
- Quasar.LD
- Quasar.RA
- Quasar.SA
- ShellcodeRunner.Gen.C
- ShellcodeRunner.Gen.K
- ShellcodeRunner.TO
- ShellcodeRunner.TV
- Stealer.IFDE
- Trojan.Downloader.Gen.JS
- Trojan.ShellcodeRunner.Gen.HK
- Trojan.ShellcodeRunner.Gen.JX
- Vidar.PA
- Vidar.PB
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Manipulation Evasion |
|
| User Data Access |
|
| Network Wininet |
|
| Network Winhttp |
|
| Anti Debug |
|
| Other Suspicious |
|