General
-
Target
ed86a4e148f01d044cd511935708a37f52a1961554bff726f1d68aeba811ebe2.exe
-
Size
2.4MB
-
Sample
240524-ma148ade74
-
MD5
22e0abdaad16d3b5c4008e801aee32d6
-
SHA1
c9e61680c005e8816bfb234c6b3c4c68baecb80b
-
SHA256
ed86a4e148f01d044cd511935708a37f52a1961554bff726f1d68aeba811ebe2
-
SHA512
c6a10d046a405327bcfd817eb2a5984523a0acdbdb7ed9d2515e61de4a5198a2be2341cb536acf86fc48d2e7a3716c90e92fc226d347cda5a5f32ff7af7887b0
-
SSDEEP
49152:jxIRJF1HL+VdX68kUSJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dStIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
ed86a4e148f01d044cd511935708a37f52a1961554bff726f1d68aeba811ebe2.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
ed86a4e148f01d044cd511935708a37f52a1961554bff726f1d68aeba811ebe2.exe
-
Size
2.4MB
-
MD5
22e0abdaad16d3b5c4008e801aee32d6
-
SHA1
c9e61680c005e8816bfb234c6b3c4c68baecb80b
-
SHA256
ed86a4e148f01d044cd511935708a37f52a1961554bff726f1d68aeba811ebe2
-
SHA512
c6a10d046a405327bcfd817eb2a5984523a0acdbdb7ed9d2515e61de4a5198a2be2341cb536acf86fc48d2e7a3716c90e92fc226d347cda5a5f32ff7af7887b0
-
SSDEEP
49152:jxIRJF1HL+VdX68kUSJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dStIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-