General
-
Target
4cb736adec75a55221d734419a6feb3fa092cd19f4644a2dc5c0e3df749b215cN
-
Size
8.3MB
-
Sample
240928-t6cj3awakr
-
MD5
69674243c7d65e72d226089e9adfdf20
-
SHA1
37ece8fa260de9900f194d59ebc57c75acd578f1
-
SHA256
4cb736adec75a55221d734419a6feb3fa092cd19f4644a2dc5c0e3df749b215c
-
SHA512
fc4799f8fd7c3f625fd301a18457fde33521512bf20864b4bb700e094e0713e663d493a65959483e3eb984b6e9a5352fd4894d95c4a11d60e42c27b4645700ca
-
SSDEEP
196608:Nhb0vhDix4Xgvoe4IdCCmbU0RWtPHYb/FCUUrbNQv4:L0JVXgvoerkU1p4btnYM4
Static task
static1
Behavioral task
behavioral1
Sample
4cb736adec75a55221d734419a6feb3fa092cd19f4644a2dc5c0e3df749b215cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4cb736adec75a55221d734419a6feb3fa092cd19f4644a2dc5c0e3df749b215cN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
10.7
de2cea1f145998409041f17e238ab295
https://steamcommunity.com/profiles/76561199751190313
https://t.me/pech0nk
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Targets
-
-
Target
4cb736adec75a55221d734419a6feb3fa092cd19f4644a2dc5c0e3df749b215cN
-
Size
8.3MB
-
MD5
69674243c7d65e72d226089e9adfdf20
-
SHA1
37ece8fa260de9900f194d59ebc57c75acd578f1
-
SHA256
4cb736adec75a55221d734419a6feb3fa092cd19f4644a2dc5c0e3df749b215c
-
SHA512
fc4799f8fd7c3f625fd301a18457fde33521512bf20864b4bb700e094e0713e663d493a65959483e3eb984b6e9a5352fd4894d95c4a11d60e42c27b4645700ca
-
SSDEEP
196608:Nhb0vhDix4Xgvoe4IdCCmbU0RWtPHYb/FCUUrbNQv4:L0JVXgvoerkU1p4btnYM4
-
Detect Vidar Stealer
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext
-