General
-
Target
abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a
-
Size
2.0MB
-
Sample
240524-ffwcladh99
-
MD5
d92c985ddae73d2e1407ca76e682f2fa
-
SHA1
8a04a22fc7d7536675af4ae5cdfbba12612751d0
-
SHA256
abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a
-
SHA512
9e83c8e1b5cf7e3ac2d6fb342923f17d15ca6677301ae8ea5fe8a4201a68b37951bc17befc4e06b3fbfa376204b3c1c2d8ddcd2a07173a9bf47971aea0cc7992
-
SSDEEP
49152:IFno/jfQJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jotIuoITsdZT
Static task
static1
Behavioral task
behavioral1
Sample
abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199686524322
https://t.me/k0mono
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1
Targets
-
-
Target
abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a
-
Size
2.0MB
-
MD5
d92c985ddae73d2e1407ca76e682f2fa
-
SHA1
8a04a22fc7d7536675af4ae5cdfbba12612751d0
-
SHA256
abaefa482e3cd3b2a498a83530a0418e32078e81d975c69b13dfd8dd12213b5a
-
SHA512
9e83c8e1b5cf7e3ac2d6fb342923f17d15ca6677301ae8ea5fe8a4201a68b37951bc17befc4e06b3fbfa376204b3c1c2d8ddcd2a07173a9bf47971aea0cc7992
-
SSDEEP
49152:IFno/jfQJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jotIuoITsdZT
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-