General
-
Target
d386b7e0fe0d94dd301ed247833e8a5514b53aaa656f89a79e310c45264360cc
-
Size
2.0MB
-
Sample
240526-h9ye6acb47
-
MD5
3294f84f677fcf66590ee280b80081a1
-
SHA1
ec96a874263fc4691584e14c91a08e8f9ead79a2
-
SHA256
d386b7e0fe0d94dd301ed247833e8a5514b53aaa656f89a79e310c45264360cc
-
SHA512
fd74d2cca0ff3966d553fd29206d75b879c5e1a729c2e15d93920d5349506d3814c3e1a734866121ff97fcde85777236492f72431e1555c9dd4f09aa58537042
-
SSDEEP
49152:s4K3x1vUqJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18qtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
d386b7e0fe0d94dd301ed247833e8a5514b53aaa656f89a79e310c45264360cc.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
d386b7e0fe0d94dd301ed247833e8a5514b53aaa656f89a79e310c45264360cc
-
Size
2.0MB
-
MD5
3294f84f677fcf66590ee280b80081a1
-
SHA1
ec96a874263fc4691584e14c91a08e8f9ead79a2
-
SHA256
d386b7e0fe0d94dd301ed247833e8a5514b53aaa656f89a79e310c45264360cc
-
SHA512
fd74d2cca0ff3966d553fd29206d75b879c5e1a729c2e15d93920d5349506d3814c3e1a734866121ff97fcde85777236492f72431e1555c9dd4f09aa58537042
-
SSDEEP
49152:s4K3x1vUqJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18qtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-