General
-
Target
28b50b511d4cc2e46d9c22122ac11baea2b71eeb673fa358809b47244afa992e.exe
-
Size
2.4MB
-
Sample
240524-matedade69
-
MD5
2c20cbf4b68f6a293fed6564f132054e
-
SHA1
9532526b19482c7527439ddd71f652acca2c0e96
-
SHA256
28b50b511d4cc2e46d9c22122ac11baea2b71eeb673fa358809b47244afa992e
-
SHA512
768b5d771f5db7a6e8e523a3037f1a052061c9090a9b5a3bc9180c9d90b8cf8262e166a0dc1b87ec76920a1b47c2f6eae9ef2c88af4d10b6a9ffc5dfe386a862
-
SSDEEP
49152:jxIRJF1HL+VdX68kUqJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dqtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
28b50b511d4cc2e46d9c22122ac11baea2b71eeb673fa358809b47244afa992e.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
28b50b511d4cc2e46d9c22122ac11baea2b71eeb673fa358809b47244afa992e.exe
-
Size
2.4MB
-
MD5
2c20cbf4b68f6a293fed6564f132054e
-
SHA1
9532526b19482c7527439ddd71f652acca2c0e96
-
SHA256
28b50b511d4cc2e46d9c22122ac11baea2b71eeb673fa358809b47244afa992e
-
SHA512
768b5d771f5db7a6e8e523a3037f1a052061c9090a9b5a3bc9180c9d90b8cf8262e166a0dc1b87ec76920a1b47c2f6eae9ef2c88af4d10b6a9ffc5dfe386a862
-
SSDEEP
49152:jxIRJF1HL+VdX68kUqJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dqtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-