General
-
Target
933712c06e7f37c66f027608391a24ff0873f215f9e778b42f673957f6497acb
-
Size
1.7MB
-
Sample
240704-tbqs7s1ckh
-
MD5
a14953efe2b9f3c47bf68e39a0edfa3d
-
SHA1
2d6ca40be0856ea91c7f3f92e6b03ae3fb3e944c
-
SHA256
933712c06e7f37c66f027608391a24ff0873f215f9e778b42f673957f6497acb
-
SHA512
eaea27cae2f2350dc77030a1294cd0f82dc913dbfc9f2e4dcaf043865b9ead63de0ea8c96cbfeb73fc91cbb2131c3c8a7aa1dc0bef9ec9c8dcb2c11c952ad661
-
SSDEEP
24576:UBqWKKYMPEV1YzMPkYHXANYksiZArxliP4OTomFu5Xxth9:UyM8V18W5aYRi2lpYu5XxZ
Static task
static1
Behavioral task
behavioral1
Sample
933712c06e7f37c66f027608391a24ff0873f215f9e778b42f673957f6497acb.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
vidar
https://t.me/bu77un
https://steamcommunity.com/profiles/76561199730044335
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Targets
-
-
Target
933712c06e7f37c66f027608391a24ff0873f215f9e778b42f673957f6497acb
-
Size
1.7MB
-
MD5
a14953efe2b9f3c47bf68e39a0edfa3d
-
SHA1
2d6ca40be0856ea91c7f3f92e6b03ae3fb3e944c
-
SHA256
933712c06e7f37c66f027608391a24ff0873f215f9e778b42f673957f6497acb
-
SHA512
eaea27cae2f2350dc77030a1294cd0f82dc913dbfc9f2e4dcaf043865b9ead63de0ea8c96cbfeb73fc91cbb2131c3c8a7aa1dc0bef9ec9c8dcb2c11c952ad661
-
SSDEEP
24576:UBqWKKYMPEV1YzMPkYHXANYksiZArxliP4OTomFu5Xxth9:UyM8V18W5aYRi2lpYu5XxZ
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-