General
-
Target
a545672b2f596aa66356486779f19c0bbdc30a82ae11f0d598002fc7edf115c0
-
Size
2.1MB
-
Sample
240624-wdy9gaxhlq
-
MD5
26178268aba099a5e9c1b0c63b84ac5e
-
SHA1
acac33c32048f94902e6224ee9d31a0834a673ac
-
SHA256
a545672b2f596aa66356486779f19c0bbdc30a82ae11f0d598002fc7edf115c0
-
SHA512
936d6ffb8b2e9ae743b00bd4354ee3e6a34ccba326656cd282044f945d9a8dbb9323ebaf50eb4791229cba2fb4a8e644dc5056db650d1c2f238901bd55e6e5f7
-
SSDEEP
24576:cC/gyrgOo5VvmUfq+Zc1Fsuqf9sLUfMxVVtes12FxwojKr98YGeGGHzqqikY+rPN:c3xbZcjHLUkxVVChjHZQHzqZ+rPlV
Static task
static1
Behavioral task
behavioral1
Sample
a545672b2f596aa66356486779f19c0bbdc30a82ae11f0d598002fc7edf115c0.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
a545672b2f596aa66356486779f19c0bbdc30a82ae11f0d598002fc7edf115c0
-
Size
2.1MB
-
MD5
26178268aba099a5e9c1b0c63b84ac5e
-
SHA1
acac33c32048f94902e6224ee9d31a0834a673ac
-
SHA256
a545672b2f596aa66356486779f19c0bbdc30a82ae11f0d598002fc7edf115c0
-
SHA512
936d6ffb8b2e9ae743b00bd4354ee3e6a34ccba326656cd282044f945d9a8dbb9323ebaf50eb4791229cba2fb4a8e644dc5056db650d1c2f238901bd55e6e5f7
-
SSDEEP
24576:cC/gyrgOo5VvmUfq+Zc1Fsuqf9sLUfMxVVtes12FxwojKr98YGeGGHzqqikY+rPN:c3xbZcjHLUkxVVChjHZQHzqZ+rPlV
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-