General
-
Target
e9edfb560307e1bd40f575a8dc1d9835e13059388cfb72ffbbe8aefc99d7fbf5
-
Size
14.1MB
-
Sample
240614-qbffpa1hrg
-
MD5
5d0b96b2f2610709f046780420ab2ccc
-
SHA1
9980ca77ad2e5eae32733c1d6df05f878e092e5a
-
SHA256
e9edfb560307e1bd40f575a8dc1d9835e13059388cfb72ffbbe8aefc99d7fbf5
-
SHA512
dae781d02638da51f353cc66b8cdd6d759e2987a21cc7f02baa432a94bc9c977426c61ffe0f06d1cfa60a3f8d0e10e16fe3ada78affe1c8921b52ac3a85889f8
-
SSDEEP
98304:yvMsbagKjC8xLKyAGN3W2+vVdL2uMXJsuLfMhj0+N0R/EKbMkZfmTUTAMs:MfK/eyAGN3UvVd0XJsOfMhjQRcKCdMs
Static task
static1
Behavioral task
behavioral1
Sample
e9edfb560307e1bd40f575a8dc1d9835e13059388cfb72ffbbe8aefc99d7fbf5.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/memve4erin
https://steamcommunity.com/profiles/76561199699680841
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
e9edfb560307e1bd40f575a8dc1d9835e13059388cfb72ffbbe8aefc99d7fbf5
-
Size
14.1MB
-
MD5
5d0b96b2f2610709f046780420ab2ccc
-
SHA1
9980ca77ad2e5eae32733c1d6df05f878e092e5a
-
SHA256
e9edfb560307e1bd40f575a8dc1d9835e13059388cfb72ffbbe8aefc99d7fbf5
-
SHA512
dae781d02638da51f353cc66b8cdd6d759e2987a21cc7f02baa432a94bc9c977426c61ffe0f06d1cfa60a3f8d0e10e16fe3ada78affe1c8921b52ac3a85889f8
-
SSDEEP
98304:yvMsbagKjC8xLKyAGN3W2+vVdL2uMXJsuLfMhj0+N0R/EKbMkZfmTUTAMs:MfK/eyAGN3UvVd0XJsOfMhjQRcKCdMs
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-