General
-
Target
376de18ef5ccdae65cf3223811ecd5ef2bbeff7969fe81149b6db090d3c0e40f
-
Size
2.6MB
-
Sample
240528-r99b4aaf65
-
MD5
5afb6c7d8f8b593a19a5e8f40622f383
-
SHA1
649eb33b727b09d5f3c4bdd7dc80f75ea776a4db
-
SHA256
376de18ef5ccdae65cf3223811ecd5ef2bbeff7969fe81149b6db090d3c0e40f
-
SHA512
59cede9ee2c6f839f523336d58388d4642895bce420052523d542446b5d2b53bb85c107570d928481815ff1c78026e01d6ccd4ba680d182bf76f4e44c3257a6d
-
SSDEEP
49152:XQzIzMiqCNwGJtTF+TxMoxc1TU+j+dAzGwlrh:XY598ztIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
376de18ef5ccdae65cf3223811ecd5ef2bbeff7969fe81149b6db090d3c0e40f.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
376de18ef5ccdae65cf3223811ecd5ef2bbeff7969fe81149b6db090d3c0e40f
-
Size
2.6MB
-
MD5
5afb6c7d8f8b593a19a5e8f40622f383
-
SHA1
649eb33b727b09d5f3c4bdd7dc80f75ea776a4db
-
SHA256
376de18ef5ccdae65cf3223811ecd5ef2bbeff7969fe81149b6db090d3c0e40f
-
SHA512
59cede9ee2c6f839f523336d58388d4642895bce420052523d542446b5d2b53bb85c107570d928481815ff1c78026e01d6ccd4ba680d182bf76f4e44c3257a6d
-
SSDEEP
49152:XQzIzMiqCNwGJtTF+TxMoxc1TU+j+dAzGwlrh:XY598ztIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-