General
-
Target
file.exe
-
Size
580KB
-
Sample
241006-zapgmsydkd
-
MD5
d2a66a09ec4c30b500b8a250ecac14eb
-
SHA1
d4f675b2757df6173c14d3fe9fa6f7b69c72e5f3
-
SHA256
af7db44f0971145d05b8ce1757fc2f8d0f549f39d2ea1818a96851f8d1df07eb
-
SHA512
c9b10576ae5b6fb2057a4ff6acfa45b25522ee739145faeac3b575f6b7f8e6f7dbc924ecb41a273c8c2b016c7aa6676e34630b5bdc8fb6b7059b772b86b326bd
-
SSDEEP
12288:vKLvg3InPBIPKOn8qRpbxjWJOnW7bYRV/WEIX36PYPqIrK8:vKc3IPQjoB7U//WEIn6PCd
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Malware Config
Extracted
vidar
http://proxy.johnmccrea.com/
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Targets
-
-
Target
file.exe
-
Size
580KB
-
MD5
d2a66a09ec4c30b500b8a250ecac14eb
-
SHA1
d4f675b2757df6173c14d3fe9fa6f7b69c72e5f3
-
SHA256
af7db44f0971145d05b8ce1757fc2f8d0f549f39d2ea1818a96851f8d1df07eb
-
SHA512
c9b10576ae5b6fb2057a4ff6acfa45b25522ee739145faeac3b575f6b7f8e6f7dbc924ecb41a273c8c2b016c7aa6676e34630b5bdc8fb6b7059b772b86b326bd
-
SSDEEP
12288:vKLvg3InPBIPKOn8qRpbxjWJOnW7bYRV/WEIX36PYPqIrK8:vKc3IPQjoB7U//WEIn6PCd
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-