General
-
Target
2f8a480ffc6253b951118429b21c7521fcc4ad4c1f2d2827ffed0f96b6315af2
-
Size
2.0MB
-
Sample
240526-x4l79shh45
-
MD5
a84bdbf3b579ce73e671231d4c755245
-
SHA1
2869bf756c54bcebbeb0fc1153b450fa3fad9e6b
-
SHA256
2f8a480ffc6253b951118429b21c7521fcc4ad4c1f2d2827ffed0f96b6315af2
-
SHA512
bf2b957c0d93a8114c104e7beae5df443d03dec5d4de58459a0f861c104969e76c767309082b5db37b35cdd0cd2cb38a91a1b536f834c0553ce3fbe9d3eb46a0
-
SSDEEP
49152:OePpQElJtTF+TxMoxc1TU+j+dAzGwlrh:OePpQEltIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
2f8a480ffc6253b951118429b21c7521fcc4ad4c1f2d2827ffed0f96b6315af2.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
2f8a480ffc6253b951118429b21c7521fcc4ad4c1f2d2827ffed0f96b6315af2
-
Size
2.0MB
-
MD5
a84bdbf3b579ce73e671231d4c755245
-
SHA1
2869bf756c54bcebbeb0fc1153b450fa3fad9e6b
-
SHA256
2f8a480ffc6253b951118429b21c7521fcc4ad4c1f2d2827ffed0f96b6315af2
-
SHA512
bf2b957c0d93a8114c104e7beae5df443d03dec5d4de58459a0f861c104969e76c767309082b5db37b35cdd0cd2cb38a91a1b536f834c0553ce3fbe9d3eb46a0
-
SSDEEP
49152:OePpQElJtTF+TxMoxc1TU+j+dAzGwlrh:OePpQEltIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-