General
-
Target
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49
-
Size
412KB
-
Sample
240617-fqq6mazclr
-
MD5
199b3fac9ac583cee18d6967a14ad6f4
-
SHA1
71875ea5dbd2ed7e16b34476e1f05fcbe164603d
-
SHA256
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49
-
SHA512
b00cd6e4fa3764c0a7a9a3c1f2648a49f6281979f7f574fa7639d721c11aa0e8fc2ab0f1d29070bee5f4db20f92bf78104bf0b05bfe6fde2db501e36816bb488
-
SSDEEP
6144:z2DUGv8rrPDXLU7nUp57KPBOgssDeKBQhkldbUu+fVDF9w9fdtE/fEwqGS:z2xv8rjDT7cWsDVQhkldbEo9VYRS
Static task
static1
Behavioral task
behavioral1
Sample
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/memve4erin
https://steamcommunity.com/profiles/76561199699680841
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49
-
Size
412KB
-
MD5
199b3fac9ac583cee18d6967a14ad6f4
-
SHA1
71875ea5dbd2ed7e16b34476e1f05fcbe164603d
-
SHA256
48bc1d427c46a8e213d03ce347162f3fd2076766ddff3e70bd52b95f967e8e49
-
SHA512
b00cd6e4fa3764c0a7a9a3c1f2648a49f6281979f7f574fa7639d721c11aa0e8fc2ab0f1d29070bee5f4db20f92bf78104bf0b05bfe6fde2db501e36816bb488
-
SSDEEP
6144:z2DUGv8rrPDXLU7nUp57KPBOgssDeKBQhkldbUu+fVDF9w9fdtE/fEwqGS:z2xv8rjDT7cWsDVQhkldbEo9VYRS
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-