General
-
Target
196566a6500aeff667af35504325aceee3191a8400bfcda8ee4d8fa81fd1c9c8
-
Size
2.5MB
-
Sample
240607-p13rvagc3y
-
MD5
c1a961b367373866561c90273e8dcf38
-
SHA1
836c5790b9ff5775958d599e85e5b0b36f1a351b
-
SHA256
196566a6500aeff667af35504325aceee3191a8400bfcda8ee4d8fa81fd1c9c8
-
SHA512
4e35d7bda22aeee344e8e5930445dae433361b88862e86b1c9e31a69098b523679ba45dd037aa30ed2b0946867baafc391dff83615711a5bab3b56b39f029f28
-
SSDEEP
49152:Zcm4081qpZBUbHEmJksEAQACR07Q3byRD8aXY658:ZcmmqvBUbHt+fAw07QLyLn
Static task
static1
Behavioral task
behavioral1
Sample
196566a6500aeff667af35504325aceee3191a8400bfcda8ee4d8fa81fd1c9c8.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
196566a6500aeff667af35504325aceee3191a8400bfcda8ee4d8fa81fd1c9c8
-
Size
2.5MB
-
MD5
c1a961b367373866561c90273e8dcf38
-
SHA1
836c5790b9ff5775958d599e85e5b0b36f1a351b
-
SHA256
196566a6500aeff667af35504325aceee3191a8400bfcda8ee4d8fa81fd1c9c8
-
SHA512
4e35d7bda22aeee344e8e5930445dae433361b88862e86b1c9e31a69098b523679ba45dd037aa30ed2b0946867baafc391dff83615711a5bab3b56b39f029f28
-
SSDEEP
49152:Zcm4081qpZBUbHEmJksEAQACR07Q3byRD8aXY658:ZcmmqvBUbHt+fAw07QLyLn
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-