General
-
Target
efb276959f457b244fc96a91999e44d713b6a011b0a77e94987f38db413c3619
-
Size
2.0MB
-
Sample
240525-kysfwace68
-
MD5
06a2cd3144a81af7b6e1188225a2044d
-
SHA1
73021c40ee8ca1500c3cf7dfc7a8e5e9cdbd6ff7
-
SHA256
efb276959f457b244fc96a91999e44d713b6a011b0a77e94987f38db413c3619
-
SHA512
6ababd00fdb61b72b356d8af0517901b171c5220c5837de608733f7c32e9e979ac895d600fa58fbc3b3fbc468d9d7894d0db4553c77c15d3738b2b474748530b
-
SSDEEP
49152:s4K3x1vU6JtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex186tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
efb276959f457b244fc96a91999e44d713b6a011b0a77e94987f38db413c3619.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
efb276959f457b244fc96a91999e44d713b6a011b0a77e94987f38db413c3619
-
Size
2.0MB
-
MD5
06a2cd3144a81af7b6e1188225a2044d
-
SHA1
73021c40ee8ca1500c3cf7dfc7a8e5e9cdbd6ff7
-
SHA256
efb276959f457b244fc96a91999e44d713b6a011b0a77e94987f38db413c3619
-
SHA512
6ababd00fdb61b72b356d8af0517901b171c5220c5837de608733f7c32e9e979ac895d600fa58fbc3b3fbc468d9d7894d0db4553c77c15d3738b2b474748530b
-
SSDEEP
49152:s4K3x1vU6JtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex186tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-