General
-
Target
6232fa431436485032139df9b297cf334a5cc096d0ac92edd007e3ae57de8a0f
-
Size
2.4MB
-
Sample
240523-2qlrsscb2s
-
MD5
c1b08601db8549e2c9a0e375d42c995d
-
SHA1
65969473ef27abdcbf8094dadda252fbbab0d1a0
-
SHA256
6232fa431436485032139df9b297cf334a5cc096d0ac92edd007e3ae57de8a0f
-
SHA512
0e4bcd1c6eb6ff3e84f3c8e4d43b1eaf90ac70810ba672795aeaa5c951b7c0111ad2f51c07b11f3735796deb23c4eacbed9507ed20d2029be50ada08af78baf3
-
SSDEEP
49152:jxIRJF1HL+VdX68kU2JtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68d2tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
6232fa431436485032139df9b297cf334a5cc096d0ac92edd007e3ae57de8a0f.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
6232fa431436485032139df9b297cf334a5cc096d0ac92edd007e3ae57de8a0f
-
Size
2.4MB
-
MD5
c1b08601db8549e2c9a0e375d42c995d
-
SHA1
65969473ef27abdcbf8094dadda252fbbab0d1a0
-
SHA256
6232fa431436485032139df9b297cf334a5cc096d0ac92edd007e3ae57de8a0f
-
SHA512
0e4bcd1c6eb6ff3e84f3c8e4d43b1eaf90ac70810ba672795aeaa5c951b7c0111ad2f51c07b11f3735796deb23c4eacbed9507ed20d2029be50ada08af78baf3
-
SSDEEP
49152:jxIRJF1HL+VdX68kU2JtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68d2tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-