General
-
Target
6a54a0c0c59749ca2d7759f2911ff5e3eddd8dc70462d0ab2b7fff14733e4ae3
-
Size
5.0MB
-
Sample
240617-frlyaszcqk
-
MD5
eb1825f67fa812d4cf489c0a91d6abb1
-
SHA1
0e184078748e2fc476d58ff885a928ce06edf532
-
SHA256
6a54a0c0c59749ca2d7759f2911ff5e3eddd8dc70462d0ab2b7fff14733e4ae3
-
SHA512
392b933fb93a4ac4752b9dd641000e160c80c2a3fc36bf17ce9d2b19536e82986926734d41cb040ad34d908e96339103d76280d9a29982cd89c699011824fce4
-
SSDEEP
98304:3uvdhDO6vR6yCeRIjylH/2pVdQIxBXj57zxe:3yLDO6vR6yCeAwQ5Bt7zxe
Static task
static1
Behavioral task
behavioral1
Sample
6a54a0c0c59749ca2d7759f2911ff5e3eddd8dc70462d0ab2b7fff14733e4ae3.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/memve4erin
https://steamcommunity.com/profiles/76561199699680841
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
6a54a0c0c59749ca2d7759f2911ff5e3eddd8dc70462d0ab2b7fff14733e4ae3
-
Size
5.0MB
-
MD5
eb1825f67fa812d4cf489c0a91d6abb1
-
SHA1
0e184078748e2fc476d58ff885a928ce06edf532
-
SHA256
6a54a0c0c59749ca2d7759f2911ff5e3eddd8dc70462d0ab2b7fff14733e4ae3
-
SHA512
392b933fb93a4ac4752b9dd641000e160c80c2a3fc36bf17ce9d2b19536e82986926734d41cb040ad34d908e96339103d76280d9a29982cd89c699011824fce4
-
SSDEEP
98304:3uvdhDO6vR6yCeRIjylH/2pVdQIxBXj57zxe:3yLDO6vR6yCeAwQ5Bt7zxe
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-