General
-
Target
cde412fde6761b3db2ec29f3b7bcbc13599db9384b10ab08695b9cd032bf5c08
-
Size
1.9MB
-
Sample
240528-fh1p4afb5s
-
MD5
01446fb8555d10d5b0d6a69503238f21
-
SHA1
77f810b842d13d9988b99c38b9641441bdfad123
-
SHA256
cde412fde6761b3db2ec29f3b7bcbc13599db9384b10ab08695b9cd032bf5c08
-
SHA512
a225ddd646257356c019ac4133cfeb0be2a0579921507ea052bff5d5e0443d31634336afafb0ab0a5f129daf70ca48b1478e067ae636072cc2b15fe7a6025345
-
SSDEEP
49152:CdKfTn6vWJtTF+TxMoxc1TU+j+dAzGwlrh:CdKfTnVtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
cde412fde6761b3db2ec29f3b7bcbc13599db9384b10ab08695b9cd032bf5c08.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
cde412fde6761b3db2ec29f3b7bcbc13599db9384b10ab08695b9cd032bf5c08
-
Size
1.9MB
-
MD5
01446fb8555d10d5b0d6a69503238f21
-
SHA1
77f810b842d13d9988b99c38b9641441bdfad123
-
SHA256
cde412fde6761b3db2ec29f3b7bcbc13599db9384b10ab08695b9cd032bf5c08
-
SHA512
a225ddd646257356c019ac4133cfeb0be2a0579921507ea052bff5d5e0443d31634336afafb0ab0a5f129daf70ca48b1478e067ae636072cc2b15fe7a6025345
-
SSDEEP
49152:CdKfTn6vWJtTF+TxMoxc1TU+j+dAzGwlrh:CdKfTnVtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-