General
-
Target
e65f47787831de89546b616e2241d8516cd348174e0f4a35759740ab5075f8b3
-
Size
2.0MB
-
Sample
240525-w5xjysea94
-
MD5
a1cef5e196ba87c75db8f8ae17d58e97
-
SHA1
d2935bc35fda912322d3569abc872788162bab5a
-
SHA256
e65f47787831de89546b616e2241d8516cd348174e0f4a35759740ab5075f8b3
-
SHA512
f77f07170679e3c6050a8b260fe6652a2047fa0d7f6da560c67d6ff627e5f029000f05997807ec1930523f9409e28292d9bc3f5d9546fa312846b5b9cab2c7bb
-
SSDEEP
49152:s4K3x1vUeJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18etIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
e65f47787831de89546b616e2241d8516cd348174e0f4a35759740ab5075f8b3.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
e65f47787831de89546b616e2241d8516cd348174e0f4a35759740ab5075f8b3
-
Size
2.0MB
-
MD5
a1cef5e196ba87c75db8f8ae17d58e97
-
SHA1
d2935bc35fda912322d3569abc872788162bab5a
-
SHA256
e65f47787831de89546b616e2241d8516cd348174e0f4a35759740ab5075f8b3
-
SHA512
f77f07170679e3c6050a8b260fe6652a2047fa0d7f6da560c67d6ff627e5f029000f05997807ec1930523f9409e28292d9bc3f5d9546fa312846b5b9cab2c7bb
-
SSDEEP
49152:s4K3x1vUeJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18etIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-