General
-
Target
1ffac95d1d8ab10872e76e44ed9b86601e7ba4271b4be2c51f44958c1af42d2fN
-
Size
580KB
-
Sample
241010-ysjhnstgle
-
MD5
75f037c39ebd353ca72295bd4e7dee30
-
SHA1
aa59b6bb9922598526cbef700f6d004c4b713291
-
SHA256
1ffac95d1d8ab10872e76e44ed9b86601e7ba4271b4be2c51f44958c1af42d2f
-
SHA512
ab9867b1236ac5d8747dc708d71b00e02e720b35647956acdc2cfc355f79d024016eab2f4c27efd6f4d064568f4e6c105a6897397e79f5398144214f53ab0b71
-
SSDEEP
12288:mKHCYvQ2v9YT/6qzK6yb0A92E07VmoQgpuNP1ivQ+PrKA:mKZvQas/SZ2SoQ+MkvQ+T5
Static task
static1
Behavioral task
behavioral1
Sample
1ffac95d1d8ab10872e76e44ed9b86601e7ba4271b4be2c51f44958c1af42d2fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ffac95d1d8ab10872e76e44ed9b86601e7ba4271b4be2c51f44958c1af42d2fN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
http://lade.petperfectcare.com:80
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
1ffac95d1d8ab10872e76e44ed9b86601e7ba4271b4be2c51f44958c1af42d2fN
-
Size
580KB
-
MD5
75f037c39ebd353ca72295bd4e7dee30
-
SHA1
aa59b6bb9922598526cbef700f6d004c4b713291
-
SHA256
1ffac95d1d8ab10872e76e44ed9b86601e7ba4271b4be2c51f44958c1af42d2f
-
SHA512
ab9867b1236ac5d8747dc708d71b00e02e720b35647956acdc2cfc355f79d024016eab2f4c27efd6f4d064568f4e6c105a6897397e79f5398144214f53ab0b71
-
SSDEEP
12288:mKHCYvQ2v9YT/6qzK6yb0A92E07VmoQgpuNP1ivQ+PrKA:mKZvQas/SZ2SoQ+MkvQ+T5
Score10/10-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-