General
-
Target
ccde648267c24f80c9313f060d8bc3c1a66eafa16b4f3819ee1c2ec56dcc6303
-
Size
1.6MB
-
Sample
240611-rb5agszdnq
-
MD5
cde71171c356b65932778d4aec6cfbfb
-
SHA1
4da4518103760d4ffdf4858139dc54ae8b2bc6b4
-
SHA256
ccde648267c24f80c9313f060d8bc3c1a66eafa16b4f3819ee1c2ec56dcc6303
-
SHA512
ce90b69963adc6150a1bf9f930d9044957cde043633daa28f66233e00d61438577c85cf973d870121282171d8f50e85fb37fae3c06f4cd65579b8fba34289866
-
SSDEEP
24576:spM5863IGfTAVpalBhUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BhUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
ccde648267c24f80c9313f060d8bc3c1a66eafa16b4f3819ee1c2ec56dcc6303.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
ccde648267c24f80c9313f060d8bc3c1a66eafa16b4f3819ee1c2ec56dcc6303
-
Size
1.6MB
-
MD5
cde71171c356b65932778d4aec6cfbfb
-
SHA1
4da4518103760d4ffdf4858139dc54ae8b2bc6b4
-
SHA256
ccde648267c24f80c9313f060d8bc3c1a66eafa16b4f3819ee1c2ec56dcc6303
-
SHA512
ce90b69963adc6150a1bf9f930d9044957cde043633daa28f66233e00d61438577c85cf973d870121282171d8f50e85fb37fae3c06f4cd65579b8fba34289866
-
SSDEEP
24576:spM5863IGfTAVpalBhUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BhUkxVVChjHZQs
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-