General
-
Target
89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10.exe
-
Size
8.2MB
-
Sample
240924-bzcmdasbnj
-
MD5
0bb9a4d6bf434b93536ca55dde4f775b
-
SHA1
91d31cafd3efb9dbefd5955f3f22f766ee9e762a
-
SHA256
89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10
-
SHA512
4e834b05000327afb70852c1f0badf2d75789b94ff89bd3352c8afdc3e509c8de349cbb3a818ef8cfef06d1a668e9c32874998b987cefc1d1fc2645263bd25ec
-
SSDEEP
196608:AEhu47LqGzJGeFdJJMGHPP/CPZ5za/+qKcDxNY5fv7RFHnTKm:xhbzzQeFV/m5zQAfHHTF
Static task
static1
Behavioral task
behavioral1
Sample
89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
11
91ac6183dbe67a7c09b11e88fb5493b8
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10.exe
-
Size
8.2MB
-
MD5
0bb9a4d6bf434b93536ca55dde4f775b
-
SHA1
91d31cafd3efb9dbefd5955f3f22f766ee9e762a
-
SHA256
89e1469f5157b653a2333d3f71926c45716c0ac996272818e8944ae4771bae10
-
SHA512
4e834b05000327afb70852c1f0badf2d75789b94ff89bd3352c8afdc3e509c8de349cbb3a818ef8cfef06d1a668e9c32874998b987cefc1d1fc2645263bd25ec
-
SSDEEP
196608:AEhu47LqGzJGeFdJJMGHPP/CPZ5za/+qKcDxNY5fv7RFHnTKm:xhbzzQeFV/m5zQAfHHTF
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-