General
-
Target
14b3d758580a5517d82c6ee76b2072f36ab515659ee1a0d9e730d9d0df58bb0bN
-
Size
580KB
-
Sample
241009-kbxgbaydlp
-
MD5
301e656cb275c81f40f333889480b050
-
SHA1
d5b05df76ae97c1c19499b8a280d3972c4f4d195
-
SHA256
14b3d758580a5517d82c6ee76b2072f36ab515659ee1a0d9e730d9d0df58bb0b
-
SHA512
bab2ed6dde0d623209eec88bb5284ee70d010b72e31d3088a7b5da9c5ea842d24262e1de0d0dcc0c382e26671a148f6ca9720519ec7c2f1d8599ce6a05a5e43b
-
SSDEEP
12288:lmCadY9nY8vFbyL5LyFIFBGhH9nrF3jvCIFVM6GfjYrggO7dIiQEO:rasnY55LyFzvrFTvbFVM6PmW3t
Static task
static1
Behavioral task
behavioral1
Sample
14b3d758580a5517d82c6ee76b2072f36ab515659ee1a0d9e730d9d0df58bb0bN.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
http://proxy.johnmccrea.com/
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Targets
-
-
Target
14b3d758580a5517d82c6ee76b2072f36ab515659ee1a0d9e730d9d0df58bb0bN
-
Size
580KB
-
MD5
301e656cb275c81f40f333889480b050
-
SHA1
d5b05df76ae97c1c19499b8a280d3972c4f4d195
-
SHA256
14b3d758580a5517d82c6ee76b2072f36ab515659ee1a0d9e730d9d0df58bb0b
-
SHA512
bab2ed6dde0d623209eec88bb5284ee70d010b72e31d3088a7b5da9c5ea842d24262e1de0d0dcc0c382e26671a148f6ca9720519ec7c2f1d8599ce6a05a5e43b
-
SSDEEP
12288:lmCadY9nY8vFbyL5LyFIFBGhH9nrF3jvCIFVM6GfjYrggO7dIiQEO:rasnY55LyFzvrFTvbFVM6PmW3t
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-