General
-
Target
c31dc041210fac01b6f96f192cccf0398f697858cd26d32ff2ab9c519ae0ca02
-
Size
2.0MB
-
Sample
240603-gtc9lsfc83
-
MD5
36df87ed6608a7f342c894d66d898b35
-
SHA1
3b1afbcecac71e4886b8c08ed5d35729eb449dec
-
SHA256
c31dc041210fac01b6f96f192cccf0398f697858cd26d32ff2ab9c519ae0ca02
-
SHA512
de2ef2345ad0447c0999e7675b2fd4952947536cdeee93399851728d8cb757e7331fd69834b4386b45419b85e9c9a98129a0dc03833e56fe394ab1f259dc12ac
-
SSDEEP
49152:eqtdPVosJEEz/+VHA58ljrIY+96lJS9bZ:e6d9fJdc7jvedZ
Static task
static1
Behavioral task
behavioral1
Sample
c31dc041210fac01b6f96f192cccf0398f697858cd26d32ff2ab9c519ae0ca02.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/ta904ek
https://steamcommunity.com/profiles/76561199695752269
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
c31dc041210fac01b6f96f192cccf0398f697858cd26d32ff2ab9c519ae0ca02
-
Size
2.0MB
-
MD5
36df87ed6608a7f342c894d66d898b35
-
SHA1
3b1afbcecac71e4886b8c08ed5d35729eb449dec
-
SHA256
c31dc041210fac01b6f96f192cccf0398f697858cd26d32ff2ab9c519ae0ca02
-
SHA512
de2ef2345ad0447c0999e7675b2fd4952947536cdeee93399851728d8cb757e7331fd69834b4386b45419b85e9c9a98129a0dc03833e56fe394ab1f259dc12ac
-
SSDEEP
49152:eqtdPVosJEEz/+VHA58ljrIY+96lJS9bZ:e6d9fJdc7jvedZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-