General
-
Target
02a93fff58522083555c9a510ad13dc35c367d9899b907bc5271588ea389d163
-
Size
1.6MB
-
Sample
240612-kkp4lawekl
-
MD5
f7b2640c611bcb478e0a96fde8fa470a
-
SHA1
63444fcb8e498d2458f08f96e4b0f2359d0aa256
-
SHA256
02a93fff58522083555c9a510ad13dc35c367d9899b907bc5271588ea389d163
-
SHA512
ea169a8ef3531784d6e96b17ee8543d6d30de4095765afa054804d6955143df7832dd2f6d9b71d043912b9b0e721c60fbbb5c7cf1afbefae889845d9ea3c36af
-
SSDEEP
24576:spM5863IGfTAVpalBgUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BgUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
02a93fff58522083555c9a510ad13dc35c367d9899b907bc5271588ea389d163.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
02a93fff58522083555c9a510ad13dc35c367d9899b907bc5271588ea389d163
-
Size
1.6MB
-
MD5
f7b2640c611bcb478e0a96fde8fa470a
-
SHA1
63444fcb8e498d2458f08f96e4b0f2359d0aa256
-
SHA256
02a93fff58522083555c9a510ad13dc35c367d9899b907bc5271588ea389d163
-
SHA512
ea169a8ef3531784d6e96b17ee8543d6d30de4095765afa054804d6955143df7832dd2f6d9b71d043912b9b0e721c60fbbb5c7cf1afbefae889845d9ea3c36af
-
SSDEEP
24576:spM5863IGfTAVpalBgUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BgUkxVVChjHZQs
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-