Resubmissions
23-05-2024 18:23
240523-w1kdtsbg43 10General
-
Target
019defb00ac70b5260d5b7c3c8b0b477d4953bc5bac8f42fbec4d7e4aaff72e9
-
Size
2.4MB
-
Sample
240523-w1kdtsbg43
-
MD5
aa088db2fb11c45957afc3e0eddabe43
-
SHA1
72b6dfad9d46a341b3f51601e687fd1e30796621
-
SHA256
019defb00ac70b5260d5b7c3c8b0b477d4953bc5bac8f42fbec4d7e4aaff72e9
-
SHA512
48d03d6977a0c4b533ae924a9319a280fd2f6952e62d4872ec3abd56245238137258aeda1f7dc04c53e006b9caf78b63bb21acad94474efcd6e77f34e59967ac
-
SSDEEP
49152:jxIRJF1HL+VdX68kUqJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dqtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
019defb00ac70b5260d5b7c3c8b0b477d4953bc5bac8f42fbec4d7e4aaff72e9.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
019defb00ac70b5260d5b7c3c8b0b477d4953bc5bac8f42fbec4d7e4aaff72e9
-
Size
2.4MB
-
MD5
aa088db2fb11c45957afc3e0eddabe43
-
SHA1
72b6dfad9d46a341b3f51601e687fd1e30796621
-
SHA256
019defb00ac70b5260d5b7c3c8b0b477d4953bc5bac8f42fbec4d7e4aaff72e9
-
SHA512
48d03d6977a0c4b533ae924a9319a280fd2f6952e62d4872ec3abd56245238137258aeda1f7dc04c53e006b9caf78b63bb21acad94474efcd6e77f34e59967ac
-
SSDEEP
49152:jxIRJF1HL+VdX68kUqJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dqtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-