General
-
Target
a2f94952c89ea440f82877365db5b4a5cf14a10e4168a22a92fce4a8fd98404f
-
Size
363KB
-
Sample
240524-ba5xmafe72
-
MD5
75db6dfdebb9bf0d98acfc15f2219c62
-
SHA1
5bc1ceec4269b4e893f2b00c1c4b3c0cb42a3291
-
SHA256
a2f94952c89ea440f82877365db5b4a5cf14a10e4168a22a92fce4a8fd98404f
-
SHA512
b295c110369cb2c56d87aab45ff93961b076474d16ca9a7138ab3e6e7acbc8a13a2949dcbc88e6f2e96e4fae793e1793b3052c7ec390ee3d6cd517029583dd2f
-
SSDEEP
6144:1JhLSp8zWMtAJA0Z9aRlEiw+pVc4Amr7me33k/JNSdiaJIlsZa6n:pLSpmqKRw+84B7mA3aJE4aOAFn
Static task
static1
Behavioral task
behavioral1
Sample
a2f94952c89ea440f82877365db5b4a5cf14a10e4168a22a92fce4a8fd98404f.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199686524322
https://t.me/k0mono
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1
Targets
-
-
Target
a2f94952c89ea440f82877365db5b4a5cf14a10e4168a22a92fce4a8fd98404f
-
Size
363KB
-
MD5
75db6dfdebb9bf0d98acfc15f2219c62
-
SHA1
5bc1ceec4269b4e893f2b00c1c4b3c0cb42a3291
-
SHA256
a2f94952c89ea440f82877365db5b4a5cf14a10e4168a22a92fce4a8fd98404f
-
SHA512
b295c110369cb2c56d87aab45ff93961b076474d16ca9a7138ab3e6e7acbc8a13a2949dcbc88e6f2e96e4fae793e1793b3052c7ec390ee3d6cd517029583dd2f
-
SSDEEP
6144:1JhLSp8zWMtAJA0Z9aRlEiw+pVc4Amr7me33k/JNSdiaJIlsZa6n:pLSpmqKRw+84B7mA3aJE4aOAFn
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-