General
-
Target
8657e3df341135059bc2ee1bd83a650b4621a8f66619c54e7db843dff46a05db
-
Size
2.4MB
-
Sample
240525-ambnwaga5v
-
MD5
0898e7dae093d703034b7690c620a1d4
-
SHA1
eb101867cdac2af77892276f44e92a7927663e0c
-
SHA256
8657e3df341135059bc2ee1bd83a650b4621a8f66619c54e7db843dff46a05db
-
SHA512
2b0408620d70819998c45c3faab421c12f981f20f94847ad6e31add14bb264eadb0c7ba66e1a91c1e65da6389c54136301342f3609879393107a62b209c09fca
-
SSDEEP
49152:jxIRJF1HL+VdX68kU6JtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68d6tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
8657e3df341135059bc2ee1bd83a650b4621a8f66619c54e7db843dff46a05db.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
8657e3df341135059bc2ee1bd83a650b4621a8f66619c54e7db843dff46a05db
-
Size
2.4MB
-
MD5
0898e7dae093d703034b7690c620a1d4
-
SHA1
eb101867cdac2af77892276f44e92a7927663e0c
-
SHA256
8657e3df341135059bc2ee1bd83a650b4621a8f66619c54e7db843dff46a05db
-
SHA512
2b0408620d70819998c45c3faab421c12f981f20f94847ad6e31add14bb264eadb0c7ba66e1a91c1e65da6389c54136301342f3609879393107a62b209c09fca
-
SSDEEP
49152:jxIRJF1HL+VdX68kU6JtTF+TxMoxc1TU+j+dAzGwlrh:jEJF16dX68d6tIuoITsdZ
-
Detect Vidar Stealer
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables containing potential Windows Defender anti-emulation checks
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-