General
-
Target
f4310f58ea3083d92196f4265371bbf733e7df0e2090d388d07264fd747e8f10
-
Size
1.6MB
-
Sample
240612-j6h2qsvhpg
-
MD5
90471329d9cea35bdc1581ae187e5af6
-
SHA1
a57af858fe86dcc93d3d854dcf628d181a3e77ff
-
SHA256
f4310f58ea3083d92196f4265371bbf733e7df0e2090d388d07264fd747e8f10
-
SHA512
4e31aa8ce87ab859fb36f0c1ad7da97d3d0b494c70b41ab1733e13f024a2b0ed4b7d913684ad0e2292dd2d75de897c49e995c5b57fdc7804994aa619ab5dc043
-
SSDEEP
24576:spM5863IGfTAVpalB3UfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6B3UkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
f4310f58ea3083d92196f4265371bbf733e7df0e2090d388d07264fd747e8f10.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
f4310f58ea3083d92196f4265371bbf733e7df0e2090d388d07264fd747e8f10
-
Size
1.6MB
-
MD5
90471329d9cea35bdc1581ae187e5af6
-
SHA1
a57af858fe86dcc93d3d854dcf628d181a3e77ff
-
SHA256
f4310f58ea3083d92196f4265371bbf733e7df0e2090d388d07264fd747e8f10
-
SHA512
4e31aa8ce87ab859fb36f0c1ad7da97d3d0b494c70b41ab1733e13f024a2b0ed4b7d913684ad0e2292dd2d75de897c49e995c5b57fdc7804994aa619ab5dc043
-
SSDEEP
24576:spM5863IGfTAVpalB3UfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6B3UkxVVChjHZQs
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-