General
-
Target
d83a1a55697b367d425e5d573541f4bd3855a2f143863585fba17611b52714c1
-
Size
2.4MB
-
Sample
240524-n75dkshd5y
-
MD5
58127ddac364b27ac9874de73358157f
-
SHA1
d20deccb20c2fd9466ee53f5e6f7f5480d582e50
-
SHA256
d83a1a55697b367d425e5d573541f4bd3855a2f143863585fba17611b52714c1
-
SHA512
214ed85cdd6b774610557f0f1959c6ba16d39d5e96bc21edaaa1c8614c27167e0f9aea660a7680952b7245fe5e258ab51b3a653cca149faf282006dd0d51f6c6
-
SSDEEP
49152:jxIRJF1HL+VdX68kUKJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dKtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
d83a1a55697b367d425e5d573541f4bd3855a2f143863585fba17611b52714c1.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
d83a1a55697b367d425e5d573541f4bd3855a2f143863585fba17611b52714c1
-
Size
2.4MB
-
MD5
58127ddac364b27ac9874de73358157f
-
SHA1
d20deccb20c2fd9466ee53f5e6f7f5480d582e50
-
SHA256
d83a1a55697b367d425e5d573541f4bd3855a2f143863585fba17611b52714c1
-
SHA512
214ed85cdd6b774610557f0f1959c6ba16d39d5e96bc21edaaa1c8614c27167e0f9aea660a7680952b7245fe5e258ab51b3a653cca149faf282006dd0d51f6c6
-
SSDEEP
49152:jxIRJF1HL+VdX68kUKJtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68dKtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-