General
-
Target
41ee1357282ed8722ff127ac17ff0831a92a54e72c32a560abeae0d27f5c090e.exe
-
Size
396KB
-
Sample
241004-br7gsa1apf
-
MD5
cc94be13bc24599e326d03ca246a61fa
-
SHA1
73ed54a021153213ee4823683e4a9376b479d939
-
SHA256
41ee1357282ed8722ff127ac17ff0831a92a54e72c32a560abeae0d27f5c090e
-
SHA512
b2da25e014462b410d8a68dfd09c0159772271b7f706c95ab2ef517060dd5305a02b49ac021a80d9c21624c8c02bdde9b62be9dcbace2308802edcc3a336b125
-
SSDEEP
6144:bXqwxGuBem9P3ofEPGc8V8vkl4vn6QdG9eB4RyWTkui4ZR6d0psZ8EZ:bXqGGTvNUw435B4pZR6d0psaEZ
Static task
static1
Behavioral task
behavioral1
Sample
41ee1357282ed8722ff127ac17ff0831a92a54e72c32a560abeae0d27f5c090e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41ee1357282ed8722ff127ac17ff0831a92a54e72c32a560abeae0d27f5c090e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
vidar
11
433cd71b7a2bdd3668a493b00ee95630
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Extracted
lumma
https://beearvagueo.site/api
Targets
-
-
Target
41ee1357282ed8722ff127ac17ff0831a92a54e72c32a560abeae0d27f5c090e.exe
-
Size
396KB
-
MD5
cc94be13bc24599e326d03ca246a61fa
-
SHA1
73ed54a021153213ee4823683e4a9376b479d939
-
SHA256
41ee1357282ed8722ff127ac17ff0831a92a54e72c32a560abeae0d27f5c090e
-
SHA512
b2da25e014462b410d8a68dfd09c0159772271b7f706c95ab2ef517060dd5305a02b49ac021a80d9c21624c8c02bdde9b62be9dcbace2308802edcc3a336b125
-
SSDEEP
6144:bXqwxGuBem9P3ofEPGc8V8vkl4vn6QdG9eB4RyWTkui4ZR6d0psZ8EZ:bXqGGTvNUw435B4pZR6d0psaEZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-