General
-
Target
file.exe
-
Size
407KB
-
Sample
240603-k8fj3ahh5v
-
MD5
8f36720e87f9d5f3515afbe099b0e457
-
SHA1
e404cf4fb5ad9d9bff8bd5c8d343a60df27161d8
-
SHA256
7d740bcc6e1ebdf1ec1a25242db7ab2aabbfa568394f0775287e28f69d526877
-
SHA512
05e46480bf2a4e788b21a5209e9400eb73656b8bb6d716af981f36fd05a7c6142c4cfdefa9dee01098c7b2621e6ccf63c331a2ad27fcf9bcea1f45faeb133a25
-
SSDEEP
6144:+EotgE1A4rFmd7Ta1SkmkwMZCKmLuKtuMfDFrbWWxhg8ZkriwCEvMzZwb0LlmwrW:+fNUd7Ta1DTn+ttfdpbZwGCb0QMqES
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/ta904ek
https://steamcommunity.com/profiles/76561199695752269
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
file.exe
-
Size
407KB
-
MD5
8f36720e87f9d5f3515afbe099b0e457
-
SHA1
e404cf4fb5ad9d9bff8bd5c8d343a60df27161d8
-
SHA256
7d740bcc6e1ebdf1ec1a25242db7ab2aabbfa568394f0775287e28f69d526877
-
SHA512
05e46480bf2a4e788b21a5209e9400eb73656b8bb6d716af981f36fd05a7c6142c4cfdefa9dee01098c7b2621e6ccf63c331a2ad27fcf9bcea1f45faeb133a25
-
SSDEEP
6144:+EotgE1A4rFmd7Ta1SkmkwMZCKmLuKtuMfDFrbWWxhg8ZkriwCEvMzZwb0LlmwrW:+fNUd7Ta1DTn+ttfdpbZwGCb0QMqES
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-