General
-
Target
6140cb024a5ad0f4fd5331d8156f040cbb6c90b2dc080e33868261dcb36ddfed
-
Size
2.1MB
-
Sample
240612-t5nwps1hpc
-
MD5
52289375ec76217f83b9bdb7883799c4
-
SHA1
85c249791ad0a8aa75305dfa5d225945b46ec377
-
SHA256
6140cb024a5ad0f4fd5331d8156f040cbb6c90b2dc080e33868261dcb36ddfed
-
SHA512
79ebd78c5d58b866fcbd96eb52466b774a807793a0893ae8ca842feb3c0f307a705955da6593e18555dbe8fe651596c1114293bf0da6dfe138a96989636e6d12
-
SSDEEP
24576:Ub4m+sws1qLVNMIlJl6DRKbAlcNRfCKtUfMxVVtes12FxwojKr98YGeGG9iO:UZXOjt6DuAwCKtUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
6140cb024a5ad0f4fd5331d8156f040cbb6c90b2dc080e33868261dcb36ddfed.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
6140cb024a5ad0f4fd5331d8156f040cbb6c90b2dc080e33868261dcb36ddfed
-
Size
2.1MB
-
MD5
52289375ec76217f83b9bdb7883799c4
-
SHA1
85c249791ad0a8aa75305dfa5d225945b46ec377
-
SHA256
6140cb024a5ad0f4fd5331d8156f040cbb6c90b2dc080e33868261dcb36ddfed
-
SHA512
79ebd78c5d58b866fcbd96eb52466b774a807793a0893ae8ca842feb3c0f307a705955da6593e18555dbe8fe651596c1114293bf0da6dfe138a96989636e6d12
-
SSDEEP
24576:Ub4m+sws1qLVNMIlJl6DRKbAlcNRfCKtUfMxVVtes12FxwojKr98YGeGG9iO:UZXOjt6DuAwCKtUkxVVChjHZQs
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-