General
-
Target
8d4dbceb55758bb6bc3db7c3342f879415bc1caa596a5e7d9260b52ecb950ea8
-
Size
2.0MB
-
Sample
240526-a6pd3shc72
-
MD5
4933a5d15d63d310ec7ce882256dada3
-
SHA1
d71f6ea17495588c719892f61e9b3706e6ecf009
-
SHA256
8d4dbceb55758bb6bc3db7c3342f879415bc1caa596a5e7d9260b52ecb950ea8
-
SHA512
44d574ff63e63fbd9a7042863a74d0deeac7b038d8ffc3016a46e466f8dc72d54697a8e4a5fc72608b4ddf07a92bac1770f09fecd1759e004e6a524061774086
-
SSDEEP
49152:s4K3x1vUaJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18atIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
8d4dbceb55758bb6bc3db7c3342f879415bc1caa596a5e7d9260b52ecb950ea8.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
8d4dbceb55758bb6bc3db7c3342f879415bc1caa596a5e7d9260b52ecb950ea8
-
Size
2.0MB
-
MD5
4933a5d15d63d310ec7ce882256dada3
-
SHA1
d71f6ea17495588c719892f61e9b3706e6ecf009
-
SHA256
8d4dbceb55758bb6bc3db7c3342f879415bc1caa596a5e7d9260b52ecb950ea8
-
SHA512
44d574ff63e63fbd9a7042863a74d0deeac7b038d8ffc3016a46e466f8dc72d54697a8e4a5fc72608b4ddf07a92bac1770f09fecd1759e004e6a524061774086
-
SSDEEP
49152:s4K3x1vUaJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18atIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-