General
-
Target
30430e648483cbf2cbf3d4e6cc23cf4f023d270070a2480dcbf41c64bb34b3a9
-
Size
2.0MB
-
Sample
240531-cekypabb3w
-
MD5
acb499ebd1c87044e19c6f8159274238
-
SHA1
0c625e89c06cd19c78921dac0c8b9d65ac51fa73
-
SHA256
30430e648483cbf2cbf3d4e6cc23cf4f023d270070a2480dcbf41c64bb34b3a9
-
SHA512
6c1d5e4c540e9329339bc83a14e220e81283646bedc6ce8d77dd41c41c213f0345ed2bd34d778a0087753b8723d15ab68e330faa3a624275d5ddf7a43a559019
-
SSDEEP
49152:eqtdPVosJEUz/+VHA58ljrIY+96lJS9bZ:e6d9fJ9c7jvedZ
Static task
static1
Behavioral task
behavioral1
Sample
30430e648483cbf2cbf3d4e6cc23cf4f023d270070a2480dcbf41c64bb34b3a9.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/ta904ek
https://steamcommunity.com/profiles/76561199695752269
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
30430e648483cbf2cbf3d4e6cc23cf4f023d270070a2480dcbf41c64bb34b3a9
-
Size
2.0MB
-
MD5
acb499ebd1c87044e19c6f8159274238
-
SHA1
0c625e89c06cd19c78921dac0c8b9d65ac51fa73
-
SHA256
30430e648483cbf2cbf3d4e6cc23cf4f023d270070a2480dcbf41c64bb34b3a9
-
SHA512
6c1d5e4c540e9329339bc83a14e220e81283646bedc6ce8d77dd41c41c213f0345ed2bd34d778a0087753b8723d15ab68e330faa3a624275d5ddf7a43a559019
-
SSDEEP
49152:eqtdPVosJEUz/+VHA58ljrIY+96lJS9bZ:e6d9fJ9c7jvedZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-