General
-
Target
8525216ca0f0f91a7d585e21ddf4de5b73706a485738ca72a1b2f583ab9d77b4
-
Size
1.5MB
-
Sample
240628-ak9swszgqh
-
MD5
693c1ff2dd4cb667bbb7568ca04fe6a2
-
SHA1
f34b649c2e8718aa61d7fa4a7a541351eb1923f4
-
SHA256
8525216ca0f0f91a7d585e21ddf4de5b73706a485738ca72a1b2f583ab9d77b4
-
SHA512
9215fc8f08e68d9be6ff52e2633394dcfd9ede7dbf2544f1692143c6315818a39e55bc2f1bd8bd94f6585493bca01f8a0b687c1d2b64bd3bf5defa0e85b9f06f
-
SSDEEP
24576:BXc46Crf8fyhacHps+/qASfmBgXk/xrADOv1xvF87uLwmnq:BXl8ahHHO+SASagXkJr4MDkUwm
Static task
static1
Behavioral task
behavioral1
Sample
8525216ca0f0f91a7d585e21ddf4de5b73706a485738ca72a1b2f583ab9d77b4.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
8525216ca0f0f91a7d585e21ddf4de5b73706a485738ca72a1b2f583ab9d77b4
-
Size
1.5MB
-
MD5
693c1ff2dd4cb667bbb7568ca04fe6a2
-
SHA1
f34b649c2e8718aa61d7fa4a7a541351eb1923f4
-
SHA256
8525216ca0f0f91a7d585e21ddf4de5b73706a485738ca72a1b2f583ab9d77b4
-
SHA512
9215fc8f08e68d9be6ff52e2633394dcfd9ede7dbf2544f1692143c6315818a39e55bc2f1bd8bd94f6585493bca01f8a0b687c1d2b64bd3bf5defa0e85b9f06f
-
SSDEEP
24576:BXc46Crf8fyhacHps+/qASfmBgXk/xrADOv1xvF87uLwmnq:BXl8ahHHO+SASagXkJr4MDkUwm
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-