General
-
Target
ac013dd40f680fc20b4e12743cf4f9dd050f6c778dca1689dde8655d59922371
-
Size
2.4MB
-
Sample
240607-bafmqseg5v
-
MD5
8d6e2326ebae38b942d80a73a2c6cb7f
-
SHA1
f5cf2c46b5155ecae0e8cf9c2aa02cf7ee99c9f8
-
SHA256
ac013dd40f680fc20b4e12743cf4f9dd050f6c778dca1689dde8655d59922371
-
SHA512
5d37b609f45c458bbd7a64062207f3be649c6001aeebef12678d31ac41a4b244eb20439017032c48f59559ab940cbb8736cf44145a31b252a925adeda4bbed69
-
SSDEEP
49152:wQc81KnB/a/hNT/d5Ya8aesY3Ot4N7G/:wDta/hNT/d5n0etD/
Static task
static1
Behavioral task
behavioral1
Sample
ac013dd40f680fc20b4e12743cf4f9dd050f6c778dca1689dde8655d59922371.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/ta904ek
https://steamcommunity.com/profiles/76561199695752269
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
ac013dd40f680fc20b4e12743cf4f9dd050f6c778dca1689dde8655d59922371
-
Size
2.4MB
-
MD5
8d6e2326ebae38b942d80a73a2c6cb7f
-
SHA1
f5cf2c46b5155ecae0e8cf9c2aa02cf7ee99c9f8
-
SHA256
ac013dd40f680fc20b4e12743cf4f9dd050f6c778dca1689dde8655d59922371
-
SHA512
5d37b609f45c458bbd7a64062207f3be649c6001aeebef12678d31ac41a4b244eb20439017032c48f59559ab940cbb8736cf44145a31b252a925adeda4bbed69
-
SSDEEP
49152:wQc81KnB/a/hNT/d5Ya8aesY3Ot4N7G/:wDta/hNT/d5n0etD/
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-