General
-
Target
74cc6ec708106c8bc98124eb5c575ba636d378917d9019cc3ac948b8aad84bb0
-
Size
1.6MB
-
Sample
240612-fe7z1a1ejd
-
MD5
2546ae18c34d98320288c65add63c042
-
SHA1
fa3434cbf43afd30cddb985f7943eed1d5b56b56
-
SHA256
74cc6ec708106c8bc98124eb5c575ba636d378917d9019cc3ac948b8aad84bb0
-
SHA512
b763c3e0414e5a63660011afbc12384be330f643f230359b2a0850f4e82d9835eb1a195fcb70d9499f474d7a5cab8975bc454c0bb51829e4e48b04fb97da4423
-
SSDEEP
24576:spM5863IGfTAVpalBcUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BcUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
74cc6ec708106c8bc98124eb5c575ba636d378917d9019cc3ac948b8aad84bb0.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
74cc6ec708106c8bc98124eb5c575ba636d378917d9019cc3ac948b8aad84bb0
-
Size
1.6MB
-
MD5
2546ae18c34d98320288c65add63c042
-
SHA1
fa3434cbf43afd30cddb985f7943eed1d5b56b56
-
SHA256
74cc6ec708106c8bc98124eb5c575ba636d378917d9019cc3ac948b8aad84bb0
-
SHA512
b763c3e0414e5a63660011afbc12384be330f643f230359b2a0850f4e82d9835eb1a195fcb70d9499f474d7a5cab8975bc454c0bb51829e4e48b04fb97da4423
-
SSDEEP
24576:spM5863IGfTAVpalBcUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BcUkxVVChjHZQs
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-