General
-
Target
0dc21fc9092ceb862c2a6e5f33964ce1b6274f389d4508e8d696fd684d7d0f5d
-
Size
1.6MB
-
Sample
240611-3pht7awcmr
-
MD5
4d2d0d26f41627e92114a17ef4c794fb
-
SHA1
589470db44b710aca0fcc4a57a4ada921150445b
-
SHA256
0dc21fc9092ceb862c2a6e5f33964ce1b6274f389d4508e8d696fd684d7d0f5d
-
SHA512
311dc826d1ef0c947aa54b9bd2e5d480a61739106e1c5747db47f8ffb1fec1325b481d944b714617fb3ddf0f0b6d4ae14c9913a44ee32ba1755d7563a7dd3659
-
SSDEEP
24576:spM5863IGfTAVpalBZUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BZUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
0dc21fc9092ceb862c2a6e5f33964ce1b6274f389d4508e8d696fd684d7d0f5d.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
0dc21fc9092ceb862c2a6e5f33964ce1b6274f389d4508e8d696fd684d7d0f5d
-
Size
1.6MB
-
MD5
4d2d0d26f41627e92114a17ef4c794fb
-
SHA1
589470db44b710aca0fcc4a57a4ada921150445b
-
SHA256
0dc21fc9092ceb862c2a6e5f33964ce1b6274f389d4508e8d696fd684d7d0f5d
-
SHA512
311dc826d1ef0c947aa54b9bd2e5d480a61739106e1c5747db47f8ffb1fec1325b481d944b714617fb3ddf0f0b6d4ae14c9913a44ee32ba1755d7563a7dd3659
-
SSDEEP
24576:spM5863IGfTAVpalBZUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BZUkxVVChjHZQs
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-