General
-
Target
90f8d0abc7d1a0ae347d55a554f30c10d025123e834a659da2c3f036af8dddc4
-
Size
2.0MB
-
Sample
240530-xcg48shc86
-
MD5
66e9928a0a8de34da7d3fbfaee49133c
-
SHA1
7f80fd7852ac96124a4a56d54ef9286f95b61323
-
SHA256
90f8d0abc7d1a0ae347d55a554f30c10d025123e834a659da2c3f036af8dddc4
-
SHA512
3f556039eb721c912211206cfea9d3a8a55efa1c22558c5bd39fc99b3c967c86285a72efbab963f1236b5d07355511ba1db7be83bbebb527394b818579fc1027
-
SSDEEP
49152:eqtdPVosJE0z/+VHA58ljrIY+96lJS9bZ:e6d9fJFc7jvedZ
Static task
static1
Behavioral task
behavioral1
Sample
90f8d0abc7d1a0ae347d55a554f30c10d025123e834a659da2c3f036af8dddc4.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/ta904ek
https://steamcommunity.com/profiles/76561199695752269
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
90f8d0abc7d1a0ae347d55a554f30c10d025123e834a659da2c3f036af8dddc4
-
Size
2.0MB
-
MD5
66e9928a0a8de34da7d3fbfaee49133c
-
SHA1
7f80fd7852ac96124a4a56d54ef9286f95b61323
-
SHA256
90f8d0abc7d1a0ae347d55a554f30c10d025123e834a659da2c3f036af8dddc4
-
SHA512
3f556039eb721c912211206cfea9d3a8a55efa1c22558c5bd39fc99b3c967c86285a72efbab963f1236b5d07355511ba1db7be83bbebb527394b818579fc1027
-
SSDEEP
49152:eqtdPVosJE0z/+VHA58ljrIY+96lJS9bZ:e6d9fJFc7jvedZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-