Windows
Analysis Report
Tokenova.exe
Overview
General Information
Detection
Vidar
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Vidar stealer
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Monitors registry run keys for changes
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Browser Started with Remote Debugging
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara detected Credential Stealer
Classification
- System is w10x64
Tokenova.exe (PID: 5888 cmdline:
"C:\Users\ user\Deskt op\Tokenov a.exe" MD5: FC84C5D5DBD5892000AE1424656C8E34) chrome.exe (PID: 3116 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 1524 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2460 --fi eld-trial- handle=121 6,i,932556 7259167170 943,133536 5288708493 4896,26214 4 /prefetc h:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) msedge.exe (PID: 7948 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=922 3 --profil e-director y="Default " MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 8176 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=25 72 --field -trial-han dle=2504,i ,135363602 8679890773 8,87485617 5233700023 7,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) cmd.exe (PID: 7268 cmdline:
"C:\Window s\system32 \cmd.exe" /c timeout /t 10 & r d /s /q "C :\ProgramD ata\89r1v" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 8564 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) timeout.exe (PID: 8800 cmdline:
timeout /t 10 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
msedge.exe (PID: 8188 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=922 3 --profil e-director y=Default --flag-swi tches-begi n --flag-s witches-en d --disabl e-nacl --d o-not-de-e levate MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 7360 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=29 88 --field -trial-han dle=2068,i ,113519986 8962891477 0,59604129 8226355235 8,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 8468 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 7008 --fie ld-trial-h andle=2068 ,i,1135199 8689628914 770,596041 2982263552 358,262144 /prefetch :8 MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 8492 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=7176 --field-t rial-handl e=2068,i,1 1351998689 628914770, 5960412982 263552358, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 8064 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=721 6 --field- trial-hand le=2068,i, 1135199868 9628914770 ,596041298 2263552358 ,262144 /p refetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
{"C2 url": "https://steamcommunity.com/profiles/76561199828130190", "Botnet": "ot0yikam"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
Click to see the 1 entries |
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-26T01:48:56.833348+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 94.130.190.206 | 443 | 192.168.2.5 | 61249 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-26T01:48:58.193399+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 94.130.190.206 | 443 | 192.168.2.5 | 61260 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-26T01:48:55.510249+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.2.5 | 61238 | 94.130.190.206 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-26T01:48:59.584853+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61270 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:00.673310+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61277 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:08.849401+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61328 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:09.155988+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61341 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:10.223837+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61346 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:11.165111+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61353 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:12.926654+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61359 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:19.062964+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61404 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:19.944368+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61428 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:20.960977+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61449 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:22.067695+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61465 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:23.321517+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61505 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:24.657787+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61525 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:26.441918+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61552 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:31.192299+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61586 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:34.616460+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61618 | 94.130.190.206 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-26T01:49:09.155988+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61341 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:10.223837+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61346 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:11.165111+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61353 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:19.944368+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61428 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:20.960977+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61449 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:22.067695+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61465 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:23.321517+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61505 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:24.657787+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61525 | 94.130.190.206 | 443 | TCP |
2025-02-26T01:49:26.441918+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 61552 | 94.130.190.206 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-26T01:48:54.196998+0100 | 2859378 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49745 | 94.130.190.206 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |