General
-
Target
ab0aa99b75fe2c34efb8d581b69df6e55bc17f556b8da71448f7735a8c29d113
-
Size
2.0MB
-
Sample
240525-saqalsgd2z
-
MD5
637183aab0f48b7c680235b92b698d5e
-
SHA1
dd386ad5626ee2d47a3c76e8c0491e434c02305e
-
SHA256
ab0aa99b75fe2c34efb8d581b69df6e55bc17f556b8da71448f7735a8c29d113
-
SHA512
864f25de245cca2e8a4590577f004e93f1e6937e6eda6bffda9468ab75b335ee0d93c1b5fce7d1fa80c4c864f9cedafab19872400e3a75fae634cdce413b2e7b
-
SSDEEP
49152:s4K3x1vUKJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18KtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
ab0aa99b75fe2c34efb8d581b69df6e55bc17f556b8da71448f7735a8c29d113.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
ab0aa99b75fe2c34efb8d581b69df6e55bc17f556b8da71448f7735a8c29d113
-
Size
2.0MB
-
MD5
637183aab0f48b7c680235b92b698d5e
-
SHA1
dd386ad5626ee2d47a3c76e8c0491e434c02305e
-
SHA256
ab0aa99b75fe2c34efb8d581b69df6e55bc17f556b8da71448f7735a8c29d113
-
SHA512
864f25de245cca2e8a4590577f004e93f1e6937e6eda6bffda9468ab75b335ee0d93c1b5fce7d1fa80c4c864f9cedafab19872400e3a75fae634cdce413b2e7b
-
SSDEEP
49152:s4K3x1vUKJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18KtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-