General

  • Target

    3c28d7d61f790a80c8d9f2a749bdc8f15aca88f0e73df8d17a285ef1fd293aa6.exe

  • Size

    200KB

  • MD5

    5335e295791ee756734f1535710a7c53

  • SHA1

    983f272a45a8f942677755f3a1764c091f966d7c

  • SHA256

    3c28d7d61f790a80c8d9f2a749bdc8f15aca88f0e73df8d17a285ef1fd293aa6

  • SHA512

    ecb522083a7ad072cc4164932cf7eaa9ddc181e5fad62018bf5931b0718e166807a9f5ac4f5bf2ba31fd6b080754f7e852784b31ad0c7d6854c22daacba0c1a5

  • SSDEEP

    3072:cf8yYNF9ex7nLydc8NwEfgjp9yuzKrDjU+XC3bXY/1WXBQ:c8yQF9QaOtnVzE4+SbSWXG

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

9.7

Botnet

52d136f389bec064b9101e9cd85c51ef

C2

https://steamcommunity.com/profiles/76561199686524322

https://t.me/k0mono

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
  • Detects executables containing potential Windows Defender anti-emulation checks 1 IoCs
  • Stealc family
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3c28d7d61f790a80c8d9f2a749bdc8f15aca88f0e73df8d17a285ef1fd293aa6.exe
    .exe windows:5 windows x86 arch:x86

    a34c7216d6536a950566187b3d5a3285


    Headers

    Imports

    Sections