General
-
Target
7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657
-
Size
5.7MB
-
Sample
240622-nn9tysweqg
-
MD5
9f9be61292c62089a46a872961cae046
-
SHA1
093e4fa849ad041d3237eeba9c1de4dfc1446ffa
-
SHA256
7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657
-
SHA512
8263e6a3f173a5339487637a1e2e6712602b7143e08034a37a2c73c9d191f7b9d423e1314627c016f4c905d47244f43d16959ab13aeae5a07ab8f08932c07227
-
SSDEEP
98304:3wCLKnCmxzvm3VZ2NVPClN4QxjK5TBJ5Kw19sbQ0G3chMdKBC:bLKCm0GNhC8b5tHTjaMdd
Static task
static1
Behavioral task
behavioral1
Sample
7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657.exe
Resource
win11-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
10.1
56561c66bf3314a2b5cad65677212bfe
https://t.me/memve4erin
https://steamcommunity.com/profiles/76561199699680841
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Extracted
risepro
5.42.67.8:50500
Targets
-
-
Target
7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657
-
Size
5.7MB
-
MD5
9f9be61292c62089a46a872961cae046
-
SHA1
093e4fa849ad041d3237eeba9c1de4dfc1446ffa
-
SHA256
7e87bb624ca8aebac6a71494ac7d190e1266ad509ce872c0cecf7695eccfe657
-
SHA512
8263e6a3f173a5339487637a1e2e6712602b7143e08034a37a2c73c9d191f7b9d423e1314627c016f4c905d47244f43d16959ab13aeae5a07ab8f08932c07227
-
SSDEEP
98304:3wCLKnCmxzvm3VZ2NVPClN4QxjK5TBJ5Kw19sbQ0G3chMdKBC:bLKCm0GNhC8b5tHTjaMdd
-
Detect Vidar Stealer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-