General
-
Target
4d168922bfe2c239bf23050c30d1430b66ae4cf4563d13ec6e8708b71d8cd7a3
-
Size
580KB
-
Sample
241007-z8y4qsyalf
-
MD5
d00bed1e7a48b201a48d8ed601af4fdc
-
SHA1
6998fc690e22c5ea2a77786d40b1648c1ca85d1a
-
SHA256
4d168922bfe2c239bf23050c30d1430b66ae4cf4563d13ec6e8708b71d8cd7a3
-
SHA512
b5162d2d4d65971e059c10ff22f3854e2f1dd5b0f3c020f9494a13d73a6638ff9a156910687fd6dd49d5c4baceddc07be54c004d2c3f41863b74ef67fdfa2925
-
SSDEEP
12288:wmCadY9nY8vFbXp9wuvWVJYjm9KoFBtmX16opWZtW+SgZfpEEudcdIiQEO:2asnYsGYOYjaHkYZtW+S7E5W3t
Static task
static1
Behavioral task
behavioral1
Sample
4d168922bfe2c239bf23050c30d1430b66ae4cf4563d13ec6e8708b71d8cd7a3.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
http://proxy.johnmccrea.com/
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Targets
-
-
Target
4d168922bfe2c239bf23050c30d1430b66ae4cf4563d13ec6e8708b71d8cd7a3
-
Size
580KB
-
MD5
d00bed1e7a48b201a48d8ed601af4fdc
-
SHA1
6998fc690e22c5ea2a77786d40b1648c1ca85d1a
-
SHA256
4d168922bfe2c239bf23050c30d1430b66ae4cf4563d13ec6e8708b71d8cd7a3
-
SHA512
b5162d2d4d65971e059c10ff22f3854e2f1dd5b0f3c020f9494a13d73a6638ff9a156910687fd6dd49d5c4baceddc07be54c004d2c3f41863b74ef67fdfa2925
-
SSDEEP
12288:wmCadY9nY8vFbXp9wuvWVJYjm9KoFBtmX16opWZtW+SgZfpEEudcdIiQEO:2asnYsGYOYjaHkYZtW+S7E5W3t
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-