General
-
Target
11ed769f14bb6522ef32db028dbb4ecf596ebbf97668e21bdb144b647497dbd4
-
Size
2.1MB
-
Sample
240614-d8vwestfna
-
MD5
7a1cb0246d401f4293aa85891f11a30a
-
SHA1
076a6ca0b4647c4b2faa65292c89de407b3a3532
-
SHA256
11ed769f14bb6522ef32db028dbb4ecf596ebbf97668e21bdb144b647497dbd4
-
SHA512
139dbeace01767b69f64804498fd787c7917d34d08f639f31e782623fe12ac2e631013930e57bf19c95b92806ba31266a3cd005c27d9ce6bcf7b29512c0d3a8f
-
SSDEEP
24576:Ub4m+sws1qLVNMIlJl6DRKbAlcNRfCKFUfMxVVtes12FxwojKr98YGeGG9iO:UZXOjt6DuAwCKFUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
11ed769f14bb6522ef32db028dbb4ecf596ebbf97668e21bdb144b647497dbd4.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
11ed769f14bb6522ef32db028dbb4ecf596ebbf97668e21bdb144b647497dbd4
-
Size
2.1MB
-
MD5
7a1cb0246d401f4293aa85891f11a30a
-
SHA1
076a6ca0b4647c4b2faa65292c89de407b3a3532
-
SHA256
11ed769f14bb6522ef32db028dbb4ecf596ebbf97668e21bdb144b647497dbd4
-
SHA512
139dbeace01767b69f64804498fd787c7917d34d08f639f31e782623fe12ac2e631013930e57bf19c95b92806ba31266a3cd005c27d9ce6bcf7b29512c0d3a8f
-
SSDEEP
24576:Ub4m+sws1qLVNMIlJl6DRKbAlcNRfCKFUfMxVVtes12FxwojKr98YGeGG9iO:UZXOjt6DuAwCKFUkxVVChjHZQs
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-