General
-
Target
0e99e33521f55b581abc93c8800be5f83c3274f2cf59e22660beab69e6c93448
-
Size
1.6MB
-
Sample
240612-ltk2nszflb
-
MD5
200fd1d3cc526218b119f4464d9ba03e
-
SHA1
176b8d0116689fbe0cfec4a2353281f03bca9ca2
-
SHA256
0e99e33521f55b581abc93c8800be5f83c3274f2cf59e22660beab69e6c93448
-
SHA512
41dbfead7fc001ec14dbfecb0f8e210ae11fbc5091c5b3f0da07b97bbfe1ebbbfd8a6f53c9cca450adf0e29be3f90715dde7ae024c000b59c8a90dbbbe8f5c15
-
SSDEEP
24576:spM5863IGfTAVpalBuUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BuUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
0e99e33521f55b581abc93c8800be5f83c3274f2cf59e22660beab69e6c93448.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
0e99e33521f55b581abc93c8800be5f83c3274f2cf59e22660beab69e6c93448
-
Size
1.6MB
-
MD5
200fd1d3cc526218b119f4464d9ba03e
-
SHA1
176b8d0116689fbe0cfec4a2353281f03bca9ca2
-
SHA256
0e99e33521f55b581abc93c8800be5f83c3274f2cf59e22660beab69e6c93448
-
SHA512
41dbfead7fc001ec14dbfecb0f8e210ae11fbc5091c5b3f0da07b97bbfe1ebbbfd8a6f53c9cca450adf0e29be3f90715dde7ae024c000b59c8a90dbbbe8f5c15
-
SSDEEP
24576:spM5863IGfTAVpalBuUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BuUkxVVChjHZQs
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-