General
-
Target
632e26587d3e4e371ea2bfa8ce298c4d8aef95e1e5cad8f6b73c97cb656e22c6.exe
-
Size
559KB
-
Sample
241004-b1sd8axdqj
-
MD5
c01caed116f14bb01785ba57ce31f372
-
SHA1
e51f43809fadc2087812ec13242f939438a48f67
-
SHA256
632e26587d3e4e371ea2bfa8ce298c4d8aef95e1e5cad8f6b73c97cb656e22c6
-
SHA512
beff1521e2809ff28ca4d9c00746a8e2217353773f25a573e769fce80f6020266f3852a45b73673ea97858fc8fb1ca27cc2a0f7c794dc631e8942b128e903b99
-
SSDEEP
12288:PLhw2Sg/jxkhlTEuj/pntnJAWBIYwLq8Ww+DW06ENm2PsEO:dBj+jEk/TnJAYIVt+Tst
Static task
static1
Behavioral task
behavioral1
Sample
632e26587d3e4e371ea2bfa8ce298c4d8aef95e1e5cad8f6b73c97cb656e22c6.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
632e26587d3e4e371ea2bfa8ce298c4d8aef95e1e5cad8f6b73c97cb656e22c6.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
11
b74ef0d8ce56e494b0d83e1d5be9dbeb
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Extracted
lumma
https://beearvagueo.site/api
Targets
-
-
Target
632e26587d3e4e371ea2bfa8ce298c4d8aef95e1e5cad8f6b73c97cb656e22c6.exe
-
Size
559KB
-
MD5
c01caed116f14bb01785ba57ce31f372
-
SHA1
e51f43809fadc2087812ec13242f939438a48f67
-
SHA256
632e26587d3e4e371ea2bfa8ce298c4d8aef95e1e5cad8f6b73c97cb656e22c6
-
SHA512
beff1521e2809ff28ca4d9c00746a8e2217353773f25a573e769fce80f6020266f3852a45b73673ea97858fc8fb1ca27cc2a0f7c794dc631e8942b128e903b99
-
SSDEEP
12288:PLhw2Sg/jxkhlTEuj/pntnJAWBIYwLq8Ww+DW06ENm2PsEO:dBj+jEk/TnJAYIVt+Tst
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-