General
-
Target
file.exe
-
Size
580KB
-
Sample
241006-ptfzhatgnr
-
MD5
0dd02c48ff88cab7eb2129f72fb48a36
-
SHA1
0e46168f7ebf6fc6130b07acb867e1f4e2f3c2e1
-
SHA256
7636924a11e30d0ac5f8a2a7fb2b73416816565d059dbb0123324717eba828e2
-
SHA512
116e53ae4158104601827e62e0b82d35ab7e8d60859eef79fb932e8ba77aef1a55dbcf8f0a81ab788915a683628ab39c61e10e3ef106310612822dd937bb47ed
-
SSDEEP
12288:amCaBY9nY8vFbsnzdraM4eH9pQXcELgc0vE54D3kcBdIiKEO:caonYlraOQC94ckQWZt
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
http://proxy.johnmccrea.com/
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Targets
-
-
Target
file.exe
-
Size
580KB
-
MD5
0dd02c48ff88cab7eb2129f72fb48a36
-
SHA1
0e46168f7ebf6fc6130b07acb867e1f4e2f3c2e1
-
SHA256
7636924a11e30d0ac5f8a2a7fb2b73416816565d059dbb0123324717eba828e2
-
SHA512
116e53ae4158104601827e62e0b82d35ab7e8d60859eef79fb932e8ba77aef1a55dbcf8f0a81ab788915a683628ab39c61e10e3ef106310612822dd937bb47ed
-
SSDEEP
12288:amCaBY9nY8vFbsnzdraM4eH9pQXcELgc0vE54D3kcBdIiKEO:caonYlraOQC94ckQWZt
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-