General
-
Target
edcce638861b5de18ebcabd65b8fd2b07211275bb539a1743643a79b9aab146c
-
Size
2.0MB
-
Sample
240526-khx2esce9y
-
MD5
a9c149590d54631451e8bed277ffc1a5
-
SHA1
874c50f554d8804e36def971e25d4b755ab97e15
-
SHA256
edcce638861b5de18ebcabd65b8fd2b07211275bb539a1743643a79b9aab146c
-
SHA512
75468b175ac5d746d42cae04366d807c4c5951bd890740b6d485a443e342f125170ff4979c0c649eebd2b6a228224246b9c0b78c2da62ca17ac1a9e516bb8c90
-
SSDEEP
49152:s4K3x1vUeJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18etIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
edcce638861b5de18ebcabd65b8fd2b07211275bb539a1743643a79b9aab146c.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
edcce638861b5de18ebcabd65b8fd2b07211275bb539a1743643a79b9aab146c
-
Size
2.0MB
-
MD5
a9c149590d54631451e8bed277ffc1a5
-
SHA1
874c50f554d8804e36def971e25d4b755ab97e15
-
SHA256
edcce638861b5de18ebcabd65b8fd2b07211275bb539a1743643a79b9aab146c
-
SHA512
75468b175ac5d746d42cae04366d807c4c5951bd890740b6d485a443e342f125170ff4979c0c649eebd2b6a228224246b9c0b78c2da62ca17ac1a9e516bb8c90
-
SSDEEP
49152:s4K3x1vUeJtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex18etIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-