General
-
Target
866ec52c5296cde6aa8dedd875299258c783a9c4a07f98851e6fd7c9367396da
-
Size
559KB
-
Sample
241010-b8991atgnd
-
MD5
95f0dcc3e4b88dd0eb7f6a95d6a1c38f
-
SHA1
8ac0decaec841dc5a689938fcacda0b1bbe96bf9
-
SHA256
866ec52c5296cde6aa8dedd875299258c783a9c4a07f98851e6fd7c9367396da
-
SHA512
5db08a3d20eab0f34325af1c6aaa6059a5875eededb5bf8d79ceb9835d2e92af7f91b3ee8340f23b872dfc40b6523b40ad90fbf058a299e2c4314bb775969fd8
-
SSDEEP
12288:eP12qROL6WXuAVQybGwAH/6YsHGEwccznuQ9ii/cbFbu1lHDPZ:sXXauAVQyqz6Y6G4wnuQNURi37Z
Static task
static1
Behavioral task
behavioral1
Sample
866ec52c5296cde6aa8dedd875299258c783a9c4a07f98851e6fd7c9367396da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
866ec52c5296cde6aa8dedd875299258c783a9c4a07f98851e6fd7c9367396da.exe
Resource
win10-20240404-en
Malware Config
Extracted
vidar
11
b74ef0d8ce56e494b0d83e1d5be9dbeb
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
866ec52c5296cde6aa8dedd875299258c783a9c4a07f98851e6fd7c9367396da
-
Size
559KB
-
MD5
95f0dcc3e4b88dd0eb7f6a95d6a1c38f
-
SHA1
8ac0decaec841dc5a689938fcacda0b1bbe96bf9
-
SHA256
866ec52c5296cde6aa8dedd875299258c783a9c4a07f98851e6fd7c9367396da
-
SHA512
5db08a3d20eab0f34325af1c6aaa6059a5875eededb5bf8d79ceb9835d2e92af7f91b3ee8340f23b872dfc40b6523b40ad90fbf058a299e2c4314bb775969fd8
-
SSDEEP
12288:eP12qROL6WXuAVQybGwAH/6YsHGEwccznuQ9ii/cbFbu1lHDPZ:sXXauAVQyqz6Y6G4wnuQNURi37Z
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-