General
-
Target
#!SetUp_55714--!PassW0rdz#$$.zip
-
Size
13.4MB
-
Sample
240629-ptasgs1ajl
-
MD5
549c9770ad2428d79e579c0043dbd6d0
-
SHA1
7b1a84f66c6c29c557df0dd6da25a34ee9856f48
-
SHA256
db2aa4391dc953e0f04beb01d7f25fa3e3927de6e3e83ee4f83831b7f2e83caf
-
SHA512
e168938ad643bc74c3b06583fe862c59039b0c44a7bacec283c97994a1b5d6ba7d42530d5ad8696f0d1c99c6f5be5fa6f7e844d3950a08b88df25e0361d11e02
-
SSDEEP
196608:/+1UIYxxALKn+DZLAkGe7mqF7YKF68JlIKNE7kd+UcRELUxFvY7PhBS4G7sWxJcT:bxAtDBA07mq9YKEEeKO0jbUxFQzhalVQ
Static task
static1
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
Setup.exe
-
Size
675.6MB
-
MD5
acc3282f8baa586c256c7c1b6ff4522c
-
SHA1
463d8ed383ad2a36a9df93dfefa493a2a95f4445
-
SHA256
2d4a3b606626c54ef71e06abab01fb69a3ff26e8c7d5322c12511e5d8bd52dc4
-
SHA512
e9e7321bde05e5e0f882bdd99695990dae509c24a168f017f8b83b332d350d8662e81bc380cae64730d9eeb6bccbd6a2c2a6a6aedace7a51483b4251a49ca2ed
-
SSDEEP
196608:i0bq45mmYPrOLaxhWJVXdgvY23Jj/W5PCtLwFRpeZApj6bZy3yIhoR0LrLBsyyS3:bbq4o3jOLaSbKY2N/6CNyRp9j6bI
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-