General
-
Target
d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8
-
Size
4.5MB
-
Sample
241007-w95fcs1erk
-
MD5
d05c9d75442d9ce316c4705ef85f5f87
-
SHA1
f1b231d829bfc9603eab7c23cd345a2b89ccb2cf
-
SHA256
d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8
-
SHA512
f8202c9c84596f764e448c694e92861be19ad12f3163de92471b9082146dca5b2f44fb5f0ea6173cd1a69ee29e41d9cac53e6a6f89dc9c775e678d0035296a58
-
SSDEEP
98304:gbz071DTleKHsJ5MZux2G/rKJnMLEsrlIevc:u071D1Ho5SGeJMosxIyc
Static task
static1
Behavioral task
behavioral1
Sample
d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
10.7
a01c5a6c1bbc3b92c22a5d21b8548a3a
https://steamcommunity.com/profiles/76561199751190313
https://t.me/pech0nk
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Targets
-
-
Target
d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8
-
Size
4.5MB
-
MD5
d05c9d75442d9ce316c4705ef85f5f87
-
SHA1
f1b231d829bfc9603eab7c23cd345a2b89ccb2cf
-
SHA256
d5ac5dbcee0bda80b3ed0c1c7179be7ff45f912ab520090b87ea04f8b03223b8
-
SHA512
f8202c9c84596f764e448c694e92861be19ad12f3163de92471b9082146dca5b2f44fb5f0ea6173cd1a69ee29e41d9cac53e6a6f89dc9c775e678d0035296a58
-
SSDEEP
98304:gbz071DTleKHsJ5MZux2G/rKJnMLEsrlIevc:u071D1Ho5SGeJMosxIyc
-
Detect Vidar Stealer
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext
-