General
-
Target
eaec2f04454eb468c1f591be0487daec463582c2a1d839b2644f3df7ac449b7a
-
Size
413KB
-
Sample
240926-292mcstaqk
-
MD5
0656946b783a6df8ff57c45846e49de1
-
SHA1
5e5857484282f4e4d636d6558014859242b6a8f7
-
SHA256
eaec2f04454eb468c1f591be0487daec463582c2a1d839b2644f3df7ac449b7a
-
SHA512
a409d30407773f4bb8bb087352e835765460fd3557a6570e1159b01988dd1601d15a7472958b8d41509da896ec365b7b61964413d0846763a8faff511458106d
-
SSDEEP
12288:tUxpOKa8zz8WB4fZLtjEJNThSymzi0hMQwXFqEO:6Jzz8WUZLtjS5hHQi0TwXUt
Static task
static1
Behavioral task
behavioral1
Sample
eaec2f04454eb468c1f591be0487daec463582c2a1d839b2644f3df7ac449b7a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eaec2f04454eb468c1f591be0487daec463582c2a1d839b2644f3df7ac449b7a.exe
Resource
win10-20240404-en
Malware Config
Extracted
vidar
11
d80be45a1eb6454ca916f92c36ebf67d
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
eaec2f04454eb468c1f591be0487daec463582c2a1d839b2644f3df7ac449b7a
-
Size
413KB
-
MD5
0656946b783a6df8ff57c45846e49de1
-
SHA1
5e5857484282f4e4d636d6558014859242b6a8f7
-
SHA256
eaec2f04454eb468c1f591be0487daec463582c2a1d839b2644f3df7ac449b7a
-
SHA512
a409d30407773f4bb8bb087352e835765460fd3557a6570e1159b01988dd1601d15a7472958b8d41509da896ec365b7b61964413d0846763a8faff511458106d
-
SSDEEP
12288:tUxpOKa8zz8WB4fZLtjEJNThSymzi0hMQwXFqEO:6Jzz8WUZLtjS5hHQi0TwXUt
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1