General
-
Target
aa97786e9adf76f6defc26e6dae534e5c274cac67b85e53b1386e5aae31d5ed9.exe
-
Size
4.0MB
-
Sample
240616-qbs2saybqj
-
MD5
5788c3ef67c6f46dcb70081d218a12c2
-
SHA1
2ac0a7389a51ad40bb75644a57ce4ba54a0265b1
-
SHA256
aa97786e9adf76f6defc26e6dae534e5c274cac67b85e53b1386e5aae31d5ed9
-
SHA512
eab43f8b8c993f08f524c9f6008b4534b0a1dca955ff84baf3bce71fa2bcaad873a0bb5376ebbd77140efe3136c3cb74a4c41fe6fded8ac0d50347f20dd5321e
-
SSDEEP
49152:7QCRvUGbevNhRghAcQGKr44XNFRDcCvxzJyLmxEULS1S496+lxB:7QCRvUGsBgmcQHr44XKCvJJyLmxTi/9l
Static task
static1
Behavioral task
behavioral1
Sample
aa97786e9adf76f6defc26e6dae534e5c274cac67b85e53b1386e5aae31d5ed9.exe
Resource
win7-20240611-en
Malware Config
Extracted
stealc
Extracted
vidar
https://88.99.127.107
https://t.me/memve4erin
https://steamcommunity.com/profiles/76561199699680841
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
aa97786e9adf76f6defc26e6dae534e5c274cac67b85e53b1386e5aae31d5ed9.exe
-
Size
4.0MB
-
MD5
5788c3ef67c6f46dcb70081d218a12c2
-
SHA1
2ac0a7389a51ad40bb75644a57ce4ba54a0265b1
-
SHA256
aa97786e9adf76f6defc26e6dae534e5c274cac67b85e53b1386e5aae31d5ed9
-
SHA512
eab43f8b8c993f08f524c9f6008b4534b0a1dca955ff84baf3bce71fa2bcaad873a0bb5376ebbd77140efe3136c3cb74a4c41fe6fded8ac0d50347f20dd5321e
-
SSDEEP
49152:7QCRvUGbevNhRghAcQGKr44XNFRDcCvxzJyLmxEULS1S496+lxB:7QCRvUGsBgmcQHr44XKCvJJyLmxTi/9l
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-