General
-
Target
b2506074e22cbbd6c7a54b64c258ca48dd5a06bebf0830cc63596f1034045bfa.exe
-
Size
854KB
-
Sample
240526-bh7feshh77
-
MD5
498a7a01bf758c22edce4242d2a44960
-
SHA1
020d69ceb746b1fb62c65f651ee1b37769654607
-
SHA256
b2506074e22cbbd6c7a54b64c258ca48dd5a06bebf0830cc63596f1034045bfa
-
SHA512
5318ab904d014a1657e8df6cfbd5b822c70d934b31c2efef51f8317eeb5aa60e9b38925590bd7f201393c437fb13758ffd30759aab17f0f1189016429ed286e2
-
SSDEEP
24576:wQDRq87lrAOfpjo1K7l604k1QmPtAKAe4INR:wN8JMIpjo1K7wAQG/R
Static task
static1
Behavioral task
behavioral1
Sample
b2506074e22cbbd6c7a54b64c258ca48dd5a06bebf0830cc63596f1034045bfa.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://88.198.124.82
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1
Targets
-
-
Target
b2506074e22cbbd6c7a54b64c258ca48dd5a06bebf0830cc63596f1034045bfa.exe
-
Size
854KB
-
MD5
498a7a01bf758c22edce4242d2a44960
-
SHA1
020d69ceb746b1fb62c65f651ee1b37769654607
-
SHA256
b2506074e22cbbd6c7a54b64c258ca48dd5a06bebf0830cc63596f1034045bfa
-
SHA512
5318ab904d014a1657e8df6cfbd5b822c70d934b31c2efef51f8317eeb5aa60e9b38925590bd7f201393c437fb13758ffd30759aab17f0f1189016429ed286e2
-
SSDEEP
24576:wQDRq87lrAOfpjo1K7l604k1QmPtAKAe4INR:wN8JMIpjo1K7wAQG/R
-
Detect Vidar Stealer
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables containing potential Windows Defender anti-emulation checks
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-