General
-
Target
af9cfa4d63479d3dda1bc2b1591971579df760524876dc3e82c816bf77e49b4b
-
Size
1.7MB
-
Sample
240705-gmr47atdnl
-
MD5
f4c0d3ce31c946168ec1f4189453a81d
-
SHA1
a30346531291f26a4933a00fdf6f8de90704b98d
-
SHA256
af9cfa4d63479d3dda1bc2b1591971579df760524876dc3e82c816bf77e49b4b
-
SHA512
63ece1c12dc1ca83cf2a0d10dad3d403f5e8c983f475271edc5a975901b18b287696071167e969cd41c5d4485b3b1841b4583bd4326289c1e855932eef87a16c
-
SSDEEP
24576:UBqWKKYMPEVRYzMPkYHXANYksiZArxliP4OTomFu5Xxth9:UyM8VR8W5aYRi2lpYu5XxZ
Static task
static1
Behavioral task
behavioral1
Sample
af9cfa4d63479d3dda1bc2b1591971579df760524876dc3e82c816bf77e49b4b.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
vidar
https://t.me/bu77un
https://steamcommunity.com/profiles/76561199730044335
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Targets
-
-
Target
af9cfa4d63479d3dda1bc2b1591971579df760524876dc3e82c816bf77e49b4b
-
Size
1.7MB
-
MD5
f4c0d3ce31c946168ec1f4189453a81d
-
SHA1
a30346531291f26a4933a00fdf6f8de90704b98d
-
SHA256
af9cfa4d63479d3dda1bc2b1591971579df760524876dc3e82c816bf77e49b4b
-
SHA512
63ece1c12dc1ca83cf2a0d10dad3d403f5e8c983f475271edc5a975901b18b287696071167e969cd41c5d4485b3b1841b4583bd4326289c1e855932eef87a16c
-
SSDEEP
24576:UBqWKKYMPEVRYzMPkYHXANYksiZArxliP4OTomFu5Xxth9:UyM8VR8W5aYRi2lpYu5XxZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-