General
-
Target
cdf54d084007ce041a0dd019ce47b8cf619b007e531460cbb8995cb5b7f15fa4.exe
-
Size
13.5MB
-
Sample
240804-cbxhbaxcnf
-
MD5
75097944c089d35d77e365650435f1e8
-
SHA1
8b6544e94de86e2a950cea14dc5b965163dc39e4
-
SHA256
cdf54d084007ce041a0dd019ce47b8cf619b007e531460cbb8995cb5b7f15fa4
-
SHA512
cd5aec354118bbd247ae7f9276b0c809af738e736b7851c83e62dd483cab07f1bb78f5ab6f8390cff807d1e34d7ad64503914e8d5bd3915a48fb49d2050b2c3e
-
SSDEEP
393216:6r03VX937lsi+GxpZd9TiCf35BUE85VmgK+FA:t3jjVJTiEBUEEK
Static task
static1
Behavioral task
behavioral1
Sample
cdf54d084007ce041a0dd019ce47b8cf619b007e531460cbb8995cb5b7f15fa4.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199735694209
https://t.me/puffclou
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Targets
-
-
Target
cdf54d084007ce041a0dd019ce47b8cf619b007e531460cbb8995cb5b7f15fa4.exe
-
Size
13.5MB
-
MD5
75097944c089d35d77e365650435f1e8
-
SHA1
8b6544e94de86e2a950cea14dc5b965163dc39e4
-
SHA256
cdf54d084007ce041a0dd019ce47b8cf619b007e531460cbb8995cb5b7f15fa4
-
SHA512
cd5aec354118bbd247ae7f9276b0c809af738e736b7851c83e62dd483cab07f1bb78f5ab6f8390cff807d1e34d7ad64503914e8d5bd3915a48fb49d2050b2c3e
-
SSDEEP
393216:6r03VX937lsi+GxpZd9TiCf35BUE85VmgK+FA:t3jjVJTiEBUEEK
-
Detect Vidar Stealer
-
PureLog Stealer payload
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-