General
-
Target
7a95ae3b370d318bff008a07fddf1b6deb1beb78fa9e021c5c9f106d1149b553
-
Size
401KB
-
Sample
240627-gfyy6axfpn
-
MD5
cb907b20ee4fb4389d25989d7de466e8
-
SHA1
4d63141c71e834e81c5f57f90f663c409edf3a41
-
SHA256
7a95ae3b370d318bff008a07fddf1b6deb1beb78fa9e021c5c9f106d1149b553
-
SHA512
81c3f8e3362a565a426710b54e4f2b64165b764635818b788f43824b3f0cdd2dc354cbdb6ff945bdfe42bd4ade7ed05b721f978faa5af3d6df71cf6b81f13fe2
-
SSDEEP
12288:jdI4y5LNCOuGcOq1H6Bvbw1tiNPUtIbsKRHo8:jq40NKaDiyPDI
Static task
static1
Behavioral task
behavioral1
Sample
7a95ae3b370d318bff008a07fddf1b6deb1beb78fa9e021c5c9f106d1149b553.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Extracted
risepro
5.42.67.8:50500
Targets
-
-
Target
7a95ae3b370d318bff008a07fddf1b6deb1beb78fa9e021c5c9f106d1149b553
-
Size
401KB
-
MD5
cb907b20ee4fb4389d25989d7de466e8
-
SHA1
4d63141c71e834e81c5f57f90f663c409edf3a41
-
SHA256
7a95ae3b370d318bff008a07fddf1b6deb1beb78fa9e021c5c9f106d1149b553
-
SHA512
81c3f8e3362a565a426710b54e4f2b64165b764635818b788f43824b3f0cdd2dc354cbdb6ff945bdfe42bd4ade7ed05b721f978faa5af3d6df71cf6b81f13fe2
-
SSDEEP
12288:jdI4y5LNCOuGcOq1H6Bvbw1tiNPUtIbsKRHo8:jq40NKaDiyPDI
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-