General
-
Target
3b9b064128388f9a40e71c0726443b6c6581b3052fab414ccf9da4628b338039
-
Size
1.6MB
-
Sample
240612-hstewatdjb
-
MD5
d5bfec0cf5a2b571977b26d43d598653
-
SHA1
abe31d6be670d07fd92e7a16547b3e23c39906f4
-
SHA256
3b9b064128388f9a40e71c0726443b6c6581b3052fab414ccf9da4628b338039
-
SHA512
dc895e07531c1e8cbe5c21d87974f90cd46b20fb7581443bb7cac22d30e011754d23a74316dc44db8377816336c6a9a71ff79dfce09facd3030c6cb59d4ade04
-
SSDEEP
24576:spM5863IGfTAVpalB+UfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6B+UkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
3b9b064128388f9a40e71c0726443b6c6581b3052fab414ccf9da4628b338039.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
3b9b064128388f9a40e71c0726443b6c6581b3052fab414ccf9da4628b338039
-
Size
1.6MB
-
MD5
d5bfec0cf5a2b571977b26d43d598653
-
SHA1
abe31d6be670d07fd92e7a16547b3e23c39906f4
-
SHA256
3b9b064128388f9a40e71c0726443b6c6581b3052fab414ccf9da4628b338039
-
SHA512
dc895e07531c1e8cbe5c21d87974f90cd46b20fb7581443bb7cac22d30e011754d23a74316dc44db8377816336c6a9a71ff79dfce09facd3030c6cb59d4ade04
-
SSDEEP
24576:spM5863IGfTAVpalB+UfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6B+UkxVVChjHZQs
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-