General
-
Target
3a701792b33e89bfac1c191a66173545fc041a2f8b5b42fade07c713739a24d3
-
Size
1.6MB
-
Sample
240611-vtepbsvdnn
-
MD5
a29375cc89ded290ae1e5b220bc744ea
-
SHA1
a029589c4a7ee990fe68103c711227081a2dc452
-
SHA256
3a701792b33e89bfac1c191a66173545fc041a2f8b5b42fade07c713739a24d3
-
SHA512
a763d5979f74003f039cfe27060cff9ec81e8f9d1c3ce682c0ddd2fadff21da888bda9456a17b35f45c5075cdb5b2afb11880e14607576fb80d07ebe4b754a54
-
SSDEEP
24576:spM5863IGfTAVpalBEUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BEUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
3a701792b33e89bfac1c191a66173545fc041a2f8b5b42fade07c713739a24d3.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
3a701792b33e89bfac1c191a66173545fc041a2f8b5b42fade07c713739a24d3
-
Size
1.6MB
-
MD5
a29375cc89ded290ae1e5b220bc744ea
-
SHA1
a029589c4a7ee990fe68103c711227081a2dc452
-
SHA256
3a701792b33e89bfac1c191a66173545fc041a2f8b5b42fade07c713739a24d3
-
SHA512
a763d5979f74003f039cfe27060cff9ec81e8f9d1c3ce682c0ddd2fadff21da888bda9456a17b35f45c5075cdb5b2afb11880e14607576fb80d07ebe4b754a54
-
SSDEEP
24576:spM5863IGfTAVpalBEUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BEUkxVVChjHZQs
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-