General
-
Target
39394acabf7faa80df1b3f2ba51a51aaa5f00d8818ea2ad1354d2984fa01c169
-
Size
2.0MB
-
Sample
240526-bpc56ahe8y
-
MD5
10bdeeb628816ae286d11f8f13a1bbff
-
SHA1
5e24dabc917bd3a87e3fb9a828b26232777d3dfe
-
SHA256
39394acabf7faa80df1b3f2ba51a51aaa5f00d8818ea2ad1354d2984fa01c169
-
SHA512
2ac5c99ee2a8ea8232db604cc2a7ff4aae2b53b623033d2f0e03b6927575c4326f21ee3d84d39c7abf4f0250c71097c18dd73e9770d4dd166907fafe7170151a
-
SSDEEP
49152:s4K3x1vU6JtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex186tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
39394acabf7faa80df1b3f2ba51a51aaa5f00d8818ea2ad1354d2984fa01c169.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
39394acabf7faa80df1b3f2ba51a51aaa5f00d8818ea2ad1354d2984fa01c169
-
Size
2.0MB
-
MD5
10bdeeb628816ae286d11f8f13a1bbff
-
SHA1
5e24dabc917bd3a87e3fb9a828b26232777d3dfe
-
SHA256
39394acabf7faa80df1b3f2ba51a51aaa5f00d8818ea2ad1354d2984fa01c169
-
SHA512
2ac5c99ee2a8ea8232db604cc2a7ff4aae2b53b623033d2f0e03b6927575c4326f21ee3d84d39c7abf4f0250c71097c18dd73e9770d4dd166907fafe7170151a
-
SSDEEP
49152:s4K3x1vU6JtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex186tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-