General
-
Target
bf34325a650f4d90b01e9d7edd833c7d0d379de58c39dab8fbb4e569186d716c
-
Size
2.0MB
-
Sample
240525-e6cshaef54
-
MD5
8fdbae58a20ed5349b9ca0636cd5a77a
-
SHA1
b341962a6befd6e9866361700dfd1081e24be17e
-
SHA256
bf34325a650f4d90b01e9d7edd833c7d0d379de58c39dab8fbb4e569186d716c
-
SHA512
91db049085430cb663a6f8f6e60f19cd783479851927e7aec4f0c5a6db26bfac35d48a32bc7b20435f0a26b521245c90f4803985fa842cf36b6e6ea821e710c8
-
SSDEEP
49152:s4K3x1vUKJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18KtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
bf34325a650f4d90b01e9d7edd833c7d0d379de58c39dab8fbb4e569186d716c.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
bf34325a650f4d90b01e9d7edd833c7d0d379de58c39dab8fbb4e569186d716c
-
Size
2.0MB
-
MD5
8fdbae58a20ed5349b9ca0636cd5a77a
-
SHA1
b341962a6befd6e9866361700dfd1081e24be17e
-
SHA256
bf34325a650f4d90b01e9d7edd833c7d0d379de58c39dab8fbb4e569186d716c
-
SHA512
91db049085430cb663a6f8f6e60f19cd783479851927e7aec4f0c5a6db26bfac35d48a32bc7b20435f0a26b521245c90f4803985fa842cf36b6e6ea821e710c8
-
SSDEEP
49152:s4K3x1vUKJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18KtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-