General
-
Target
43d47e2bdca67c78e5a15c9eb093790ae79678c5dff0a04b95c2179620da59dd
-
Size
2.1MB
-
Sample
240614-kvck9atbre
-
MD5
bb2eff2f976d8585a760afc91ec689d7
-
SHA1
e3426c1335f9464eb5c11f2fa038003f51849cf1
-
SHA256
43d47e2bdca67c78e5a15c9eb093790ae79678c5dff0a04b95c2179620da59dd
-
SHA512
959dfbcd6634690922f0610619a6c57917730c07789e99935e13a90ffe2ef05f17f881d671dea2a73df3c4b3d154e38af7848d26aeeed6c8f4df442bf94eebf5
-
SSDEEP
24576:Ub4m+sws1qLVNMIlJl6DRKbAlcNRfCKdUfMxVVtes12FxwojKr98YGeGG9iO:UZXOjt6DuAwCKdUkxVVChjHZQs
Static task
static1
Behavioral task
behavioral1
Sample
43d47e2bdca67c78e5a15c9eb093790ae79678c5dff0a04b95c2179620da59dd.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
43d47e2bdca67c78e5a15c9eb093790ae79678c5dff0a04b95c2179620da59dd
-
Size
2.1MB
-
MD5
bb2eff2f976d8585a760afc91ec689d7
-
SHA1
e3426c1335f9464eb5c11f2fa038003f51849cf1
-
SHA256
43d47e2bdca67c78e5a15c9eb093790ae79678c5dff0a04b95c2179620da59dd
-
SHA512
959dfbcd6634690922f0610619a6c57917730c07789e99935e13a90ffe2ef05f17f881d671dea2a73df3c4b3d154e38af7848d26aeeed6c8f4df442bf94eebf5
-
SSDEEP
24576:Ub4m+sws1qLVNMIlJl6DRKbAlcNRfCKdUfMxVVtes12FxwojKr98YGeGG9iO:UZXOjt6DuAwCKdUkxVVChjHZQs
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-