General
-
Target
f1f037b2393291f7fce079a0875756e613aa2527cff0649c5f302f81b63b6755
-
Size
1.8MB
-
Sample
240603-26l3hadd42
-
MD5
f0ccfd158ab6afc054539e1ab24c9f56
-
SHA1
020a7e8bd75b484637fc7cc64d208893dda567ec
-
SHA256
f1f037b2393291f7fce079a0875756e613aa2527cff0649c5f302f81b63b6755
-
SHA512
a11c15a84809d34be113377a0ccc86003f3cf0a7b041e36d49c8d6423cba6f21415e889f9332fa5a982c20b7eeea57898bf2b6bf6feaeca4b49b89a77b54f4b7
-
SSDEEP
24576:W7YfUB7F1931tb5YaOV+rEfv0xwT3zxNOt4XigDSCuptNEynEsqqfD:W75B7FDFtb5Ya8aesY3Ot4N7G/
Static task
static1
Behavioral task
behavioral1
Sample
f1f037b2393291f7fce079a0875756e613aa2527cff0649c5f302f81b63b6755.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/ta904ek
https://steamcommunity.com/profiles/76561199695752269
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
f1f037b2393291f7fce079a0875756e613aa2527cff0649c5f302f81b63b6755
-
Size
1.8MB
-
MD5
f0ccfd158ab6afc054539e1ab24c9f56
-
SHA1
020a7e8bd75b484637fc7cc64d208893dda567ec
-
SHA256
f1f037b2393291f7fce079a0875756e613aa2527cff0649c5f302f81b63b6755
-
SHA512
a11c15a84809d34be113377a0ccc86003f3cf0a7b041e36d49c8d6423cba6f21415e889f9332fa5a982c20b7eeea57898bf2b6bf6feaeca4b49b89a77b54f4b7
-
SSDEEP
24576:W7YfUB7F1931tb5YaOV+rEfv0xwT3zxNOt4XigDSCuptNEynEsqqfD:W75B7FDFtb5Ya8aesY3Ot4N7G/
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-