General
-
Target
69d6b3006c5c81e6188d4095048f2a1afab688a12069f1142af9b66694ec1f72
-
Size
2.0MB
-
Sample
240525-24wtxsee98
-
MD5
a4a06031f6c6fa2887ef9fdd7e4f0bd9
-
SHA1
4c2eb27ebc49a951c410959b3c1b2d53806deca3
-
SHA256
69d6b3006c5c81e6188d4095048f2a1afab688a12069f1142af9b66694ec1f72
-
SHA512
67472131b907e8993c5fd8e8ed77612b1de13f0b5823a3824cd4dff88e3ac9fbe6a3f184de94bb932bc208e60a8ba5d6ed0bcd2a12514da267f33aa5b12345bc
-
SSDEEP
49152:s4K3x1vUGJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18GtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
69d6b3006c5c81e6188d4095048f2a1afab688a12069f1142af9b66694ec1f72.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
69d6b3006c5c81e6188d4095048f2a1afab688a12069f1142af9b66694ec1f72
-
Size
2.0MB
-
MD5
a4a06031f6c6fa2887ef9fdd7e4f0bd9
-
SHA1
4c2eb27ebc49a951c410959b3c1b2d53806deca3
-
SHA256
69d6b3006c5c81e6188d4095048f2a1afab688a12069f1142af9b66694ec1f72
-
SHA512
67472131b907e8993c5fd8e8ed77612b1de13f0b5823a3824cd4dff88e3ac9fbe6a3f184de94bb932bc208e60a8ba5d6ed0bcd2a12514da267f33aa5b12345bc
-
SSDEEP
49152:s4K3x1vUGJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18GtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-