General
-
Target
23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f
-
Size
2.2MB
-
Sample
240628-y5h3ns1cnf
-
MD5
094e08b1acd4b7741ba403cc7b1d9e19
-
SHA1
f905d872a8f2132e518570c7536042d02cce0cc0
-
SHA256
23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f
-
SHA512
1868d043be07fa9b7fe1286ba0ec61fe2faf43baaaa85d50b7c37c78b08f081fb300de80e1479ccdd285844542a1b62ad98ea0329ccffbed44bc9ec5e1e1b831
-
SSDEEP
49152:qpjNvr9ySAOmw4NHHO+SASagXkJr4MDkUwm:qpjNp7p4NHH8n5A
Static task
static1
Behavioral task
behavioral1
Sample
23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f
-
Size
2.2MB
-
MD5
094e08b1acd4b7741ba403cc7b1d9e19
-
SHA1
f905d872a8f2132e518570c7536042d02cce0cc0
-
SHA256
23b305f8d65784e0e30ba06c713e87466036ab3f79b9403568720b0d0cbe099f
-
SHA512
1868d043be07fa9b7fe1286ba0ec61fe2faf43baaaa85d50b7c37c78b08f081fb300de80e1479ccdd285844542a1b62ad98ea0329ccffbed44bc9ec5e1e1b831
-
SSDEEP
49152:qpjNvr9ySAOmw4NHHO+SASagXkJr4MDkUwm:qpjNp7p4NHH8n5A
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-