General
-
Target
c1825014c69aa430f2c108e0ab1ed9e13225230e0ab52a435dd578991a901a5bN
-
Size
571KB
-
Sample
241010-3ab34asbld
-
MD5
ecfbb8664ef39d16219e843ee8d94760
-
SHA1
82ffcbc7b33d04dfbe6b1120db0c904755568841
-
SHA256
c1825014c69aa430f2c108e0ab1ed9e13225230e0ab52a435dd578991a901a5b
-
SHA512
caf7c498bceee20ac7aa5122a2a712fafc4e511a87048804e82508287ab96c5b1d6650d782251ef3b2a5ada7846a5e25930c3597a7957fdf6d3985f67ef11560
-
SSDEEP
12288:smQcpXoWDMaWqjILatlEruFdhwaSNylGm1kpjBs3E/U4S:soXoIjIprCjTbyj42
Static task
static1
Behavioral task
behavioral1
Sample
c1825014c69aa430f2c108e0ab1ed9e13225230e0ab52a435dd578991a901a5bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1825014c69aa430f2c108e0ab1ed9e13225230e0ab52a435dd578991a901a5bN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
c0c7c802c4ec94ab4c7fcd88c588698c
https://t.me/maslengdsa
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
c1825014c69aa430f2c108e0ab1ed9e13225230e0ab52a435dd578991a901a5bN
-
Size
571KB
-
MD5
ecfbb8664ef39d16219e843ee8d94760
-
SHA1
82ffcbc7b33d04dfbe6b1120db0c904755568841
-
SHA256
c1825014c69aa430f2c108e0ab1ed9e13225230e0ab52a435dd578991a901a5b
-
SHA512
caf7c498bceee20ac7aa5122a2a712fafc4e511a87048804e82508287ab96c5b1d6650d782251ef3b2a5ada7846a5e25930c3597a7957fdf6d3985f67ef11560
-
SSDEEP
12288:smQcpXoWDMaWqjILatlEruFdhwaSNylGm1kpjBs3E/U4S:soXoIjIprCjTbyj42
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-