General
-
Target
c4c7045103f42bea7bc9afb11433e4f49d767be0d0b28b678a824e5627804b89.exe
-
Size
3.6MB
-
Sample
240605-cl4z5sbc6w
-
MD5
131e367009cf014321e7a70e70c4067c
-
SHA1
4c02332af53519fdae235f804f5144ba9c7e725d
-
SHA256
c4c7045103f42bea7bc9afb11433e4f49d767be0d0b28b678a824e5627804b89
-
SHA512
3702fefbcf4eab279484359f61d997b7c32d9c77dd9e255a44e96de9373d18b68ff262037494203f181c359aca549020dcfea3db01d11f8f51e224261259f99e
-
SSDEEP
49152:fWN3Bsjz4Ddee7wE4o40nQaoJab9Xejv2aH0n2EBvnE8/8OhkqdHG22T9d:f6ujz4DdeClnE8f4T
Static task
static1
Behavioral task
behavioral1
Sample
c4c7045103f42bea7bc9afb11433e4f49d767be0d0b28b678a824e5627804b89.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
c4c7045103f42bea7bc9afb11433e4f49d767be0d0b28b678a824e5627804b89.exe
-
Size
3.6MB
-
MD5
131e367009cf014321e7a70e70c4067c
-
SHA1
4c02332af53519fdae235f804f5144ba9c7e725d
-
SHA256
c4c7045103f42bea7bc9afb11433e4f49d767be0d0b28b678a824e5627804b89
-
SHA512
3702fefbcf4eab279484359f61d997b7c32d9c77dd9e255a44e96de9373d18b68ff262037494203f181c359aca549020dcfea3db01d11f8f51e224261259f99e
-
SSDEEP
49152:fWN3Bsjz4Ddee7wE4o40nQaoJab9Xejv2aH0n2EBvnE8/8OhkqdHG22T9d:f6ujz4DdeClnE8f4T
-
Detect Vidar Stealer
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables containing potential Windows Defender anti-emulation checks
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-