General
-
Target
699f99c4fe9e5df1b13445278ba21139ee16200fc94051a735609c5d5a1076f6.exe
-
Size
8.3MB
-
Sample
240924-bvfs8ssarm
-
MD5
65baa89a777d2177397a4e6d844cdadb
-
SHA1
2003625efef2b70f1df8744556aa1d1a22ab3f54
-
SHA256
699f99c4fe9e5df1b13445278ba21139ee16200fc94051a735609c5d5a1076f6
-
SHA512
eaf5c004be82c627b0bb4d974495960346090f0e8f060bf1cbd01981bb78eb5c91bff2bf0fafe026d04e6399ae10ab84cfe1abd39bbb40554d4c7bb90c7cb12e
-
SSDEEP
196608:AR6MGTjFrnGeFdJJMGHPP/CPZ5za/+qKcDxNY5fv7RFHnTKm:AdYjUeFV/m5zQAfHHTF
Static task
static1
Behavioral task
behavioral1
Sample
699f99c4fe9e5df1b13445278ba21139ee16200fc94051a735609c5d5a1076f6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
699f99c4fe9e5df1b13445278ba21139ee16200fc94051a735609c5d5a1076f6.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
11
6c52ac55967452d85aefb425eaa6d53d
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
699f99c4fe9e5df1b13445278ba21139ee16200fc94051a735609c5d5a1076f6.exe
-
Size
8.3MB
-
MD5
65baa89a777d2177397a4e6d844cdadb
-
SHA1
2003625efef2b70f1df8744556aa1d1a22ab3f54
-
SHA256
699f99c4fe9e5df1b13445278ba21139ee16200fc94051a735609c5d5a1076f6
-
SHA512
eaf5c004be82c627b0bb4d974495960346090f0e8f060bf1cbd01981bb78eb5c91bff2bf0fafe026d04e6399ae10ab84cfe1abd39bbb40554d4c7bb90c7cb12e
-
SSDEEP
196608:AR6MGTjFrnGeFdJJMGHPP/CPZ5za/+qKcDxNY5fv7RFHnTKm:AdYjUeFV/m5zQAfHHTF
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-