General
-
Target
a51dfb2e0e0d2326831abc4a7ad705d418baa483b23e8183cc5645de6c5d7368
-
Size
1.9MB
-
Sample
240527-mw68cshg59
-
MD5
5cd1f0d11a8914f180826856dc594001
-
SHA1
f5374089f51e952b88dce48d17e88996c934d7a4
-
SHA256
a51dfb2e0e0d2326831abc4a7ad705d418baa483b23e8183cc5645de6c5d7368
-
SHA512
d0fadec6862c328e0051fced987ab4814bb7b7a8941eb0abc41de7a5d7fa36b76ec888797d7edd66d23f38691798cd885df9bf60af40187d2ce03bcfa049301b
-
SSDEEP
49152:CdKfTn6vmJtTF+TxMoxc1TU+j+dAzGwlrh:CdKfTnltIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
a51dfb2e0e0d2326831abc4a7ad705d418baa483b23e8183cc5645de6c5d7368.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
a51dfb2e0e0d2326831abc4a7ad705d418baa483b23e8183cc5645de6c5d7368
-
Size
1.9MB
-
MD5
5cd1f0d11a8914f180826856dc594001
-
SHA1
f5374089f51e952b88dce48d17e88996c934d7a4
-
SHA256
a51dfb2e0e0d2326831abc4a7ad705d418baa483b23e8183cc5645de6c5d7368
-
SHA512
d0fadec6862c328e0051fced987ab4814bb7b7a8941eb0abc41de7a5d7fa36b76ec888797d7edd66d23f38691798cd885df9bf60af40187d2ce03bcfa049301b
-
SSDEEP
49152:CdKfTn6vmJtTF+TxMoxc1TU+j+dAzGwlrh:CdKfTnltIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-