General
-
Target
63ca62f5f0010838bf12974c4c8fe1586872dd461deadfa2f584e04422f943e2
-
Size
571KB
-
Sample
241008-l798qathqa
-
MD5
4cc900d0271de61dd5d72e3496f8b68e
-
SHA1
e93df1365b34c697ab5bd65623973bd2a6d6c683
-
SHA256
63ca62f5f0010838bf12974c4c8fe1586872dd461deadfa2f584e04422f943e2
-
SHA512
9935b3cd2b9c9f6f8436442ba392685dce17693b04a9dc5539190267eaad1cb50b27399b4870b4351f45b26abb3ecc0c6cac23c96e0d44f068ca3f7438058265
-
SSDEEP
12288:T3EcpXoWDMCyyZUcfaRFoMYhs6+p9E+ggnGZalS22S4S:TtXoXuiRO/hyiZb
Static task
static1
Behavioral task
behavioral1
Sample
63ca62f5f0010838bf12974c4c8fe1586872dd461deadfa2f584e04422f943e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63ca62f5f0010838bf12974c4c8fe1586872dd461deadfa2f584e04422f943e2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
4a5bc8b73e12425adc3c399da8136891
https://t.me/maslengdsa
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Targets
-
-
Target
63ca62f5f0010838bf12974c4c8fe1586872dd461deadfa2f584e04422f943e2
-
Size
571KB
-
MD5
4cc900d0271de61dd5d72e3496f8b68e
-
SHA1
e93df1365b34c697ab5bd65623973bd2a6d6c683
-
SHA256
63ca62f5f0010838bf12974c4c8fe1586872dd461deadfa2f584e04422f943e2
-
SHA512
9935b3cd2b9c9f6f8436442ba392685dce17693b04a9dc5539190267eaad1cb50b27399b4870b4351f45b26abb3ecc0c6cac23c96e0d44f068ca3f7438058265
-
SSDEEP
12288:T3EcpXoWDMCyyZUcfaRFoMYhs6+p9E+ggnGZalS22S4S:TtXoXuiRO/hyiZb
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-