General
-
Target
ebf0a2b48504013795a31526b914c09d1c84e5bbc9638c4a5e6f8cd1c02d18df.exe
-
Size
2.0MB
-
Sample
240605-sw2wjabf44
-
MD5
94f7884d2a4d8fc6a186e41debc75e4c
-
SHA1
56f351ed1b5d39c4e78dd0062025bb3440ef5161
-
SHA256
ebf0a2b48504013795a31526b914c09d1c84e5bbc9638c4a5e6f8cd1c02d18df
-
SHA512
04775100a00314d0acffa74da756875992b24d9d3823bf1ccd1fe308567dbeab989752d739476b9b637df780abea25335d6e544c55eed7a1e5fdd6a601b8372e
-
SSDEEP
49152:IFno/jfIJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jAtIuoITsdZT
Static task
static1
Behavioral task
behavioral1
Sample
ebf0a2b48504013795a31526b914c09d1c84e5bbc9638c4a5e6f8cd1c02d18df.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://steamcommunity.com/profiles/76561199686524322
https://t.me/k0mono
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1
Targets
-
-
Target
ebf0a2b48504013795a31526b914c09d1c84e5bbc9638c4a5e6f8cd1c02d18df.exe
-
Size
2.0MB
-
MD5
94f7884d2a4d8fc6a186e41debc75e4c
-
SHA1
56f351ed1b5d39c4e78dd0062025bb3440ef5161
-
SHA256
ebf0a2b48504013795a31526b914c09d1c84e5bbc9638c4a5e6f8cd1c02d18df
-
SHA512
04775100a00314d0acffa74da756875992b24d9d3823bf1ccd1fe308567dbeab989752d739476b9b637df780abea25335d6e544c55eed7a1e5fdd6a601b8372e
-
SSDEEP
49152:IFno/jfIJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jAtIuoITsdZT
-
Detect Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-