General
-
Target
199b3fac9ac583cee18d6967a14ad6f4.bin
-
Size
318KB
-
Sample
240617-bhg6jaxbqb
-
MD5
6470d2f55864a8db030c31787014c454
-
SHA1
ba3547320dcf9e5f59686b9b6d718f50e004a9b6
-
SHA256
877ea9c9358b24a32981365808b62a44e81213a2e7d0acd146ff073e34899378
-
SHA512
0805decf3603a8dc8803075bdcb0b9f9d356776e7262b6ff6cad3ede0ed8a31fdb2cbc6f7a9c0602ef1b14e7065c00e5aa08c1fb55177d905226a9e4dbea6c0a
-
SSDEEP
6144:rjEBgLhH8xByi5gK6dOH0/SNMo/TgyR9AYkLtk04kbeAYDtYC9k:rjEBagv5g1gHNH9AJLq0D9yk
Static task
static1
Behavioral task
behavioral1
Sample
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49.exe
Resource
win7-20240611-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/memve4erin
https://steamcommunity.com/profiles/76561199699680841
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49.exe
-
Size
412KB
-
MD5
199b3fac9ac583cee18d6967a14ad6f4
-
SHA1
71875ea5dbd2ed7e16b34476e1f05fcbe164603d
-
SHA256
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49
-
SHA512
b00cd6e4fa3764c0a7a9a3c1f2648a49f6281979f7f574fa7639d721c11aa0e8fc2ab0f1d29070bee5f4db20f92bf78104bf0b05bfe6fde2db501e36816bb488
-
SSDEEP
6144:z2DUGv8rrPDXLU7nUp57KPBOgssDeKBQhkldbUu+fVDF9w9fdtE/fEwqGS:z2xv8rjDT7cWsDVQhkldbEo9VYRS
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-