General
-
Target
7c34ee4fdc55e6fec4b6fe3d949942c6984be22f62bead05d46542612dd5a90d
-
Size
2.2MB
-
Sample
240625-t25p2s1cmc
-
MD5
6dd0a57ddcbbe3d6854ca1c606fad134
-
SHA1
b75f802eaa12d7aa1832c72f53db52c5b16ec7bc
-
SHA256
7c34ee4fdc55e6fec4b6fe3d949942c6984be22f62bead05d46542612dd5a90d
-
SHA512
a4e4ca5275f14789946bf195b7593f974f8e5c7f97574fcd9d7949a916c7f77635018764da167ced567bc9bf6001bd609de1c2327f030b0e572c32b5cdab566b
-
SSDEEP
49152:lAgY7fvVtbBaxmcqMTBeufKQl+bH4JbjzzEBETT29YMST:llY7nTMBTBeufKQl+bYxzIBA6uMST
Static task
static1
Behavioral task
behavioral1
Sample
7c34ee4fdc55e6fec4b6fe3d949942c6984be22f62bead05d46542612dd5a90d.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
7c34ee4fdc55e6fec4b6fe3d949942c6984be22f62bead05d46542612dd5a90d
-
Size
2.2MB
-
MD5
6dd0a57ddcbbe3d6854ca1c606fad134
-
SHA1
b75f802eaa12d7aa1832c72f53db52c5b16ec7bc
-
SHA256
7c34ee4fdc55e6fec4b6fe3d949942c6984be22f62bead05d46542612dd5a90d
-
SHA512
a4e4ca5275f14789946bf195b7593f974f8e5c7f97574fcd9d7949a916c7f77635018764da167ced567bc9bf6001bd609de1c2327f030b0e572c32b5cdab566b
-
SSDEEP
49152:lAgY7fvVtbBaxmcqMTBeufKQl+bH4JbjzzEBETT29YMST:llY7nTMBTBeufKQl+bYxzIBA6uMST
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-