General
-
Target
3d98667d1a583f8d7b8ac000ba1df35b6ada283e4c9852162845e97f17ce8ea3.zip
-
Size
8.2MB
-
Sample
241016-by7q5awdkd
-
MD5
09539fd50ea85b584c1f55c0deb71329
-
SHA1
8a1ac479872d98cadd1ca47421c43086382e81ce
-
SHA256
3d98667d1a583f8d7b8ac000ba1df35b6ada283e4c9852162845e97f17ce8ea3
-
SHA512
a4c7f48677923146a284163cd26e7891cd8d3c9f5a69a1179a89b9323aaad5a245e4721716868a4d4988dcf2a796b5529f8300901e24922e0a0e48a553856da1
-
SSDEEP
196608:sIa9VVoU9Oih0I/8sigwwVlRW5ZSMuo06gq6e1Kqw5HSaP:srjVoU9Z0IUs3wwVlIIMuo06oe1dw5t
Static task
static1
Behavioral task
behavioral1
Sample
handspecialisprot/handspecialisprot.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.1
1ad2efbf0ceace651c61a55794eeb149
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
handspecialisprot/handspecialisprot.exe
-
Size
8.2MB
-
MD5
e63f5a19c153dfe47509c7fc04055597
-
SHA1
490946abad697b842820cdf34a3e728dad356f2a
-
SHA256
7b7e1f0091db08d3b9508044e1861add62e956b614408e04e43843ccbe01d8fb
-
SHA512
3db8f19b305b8658e80947631b9ff6f8810e8f9254f0687c73cf0e3505a4679da12cf59f94077aa1b6aa00606d2f5dad12c5f1545720fc4409709e5211da6779
-
SSDEEP
196608:X+9fnWmR+m1aWLawiUQwrl767LoUu8Os4uWy92wAD1Ey:uJnWmRBaWmwPQwrliMUu8OsYy9bAD
-
Detect Vidar Stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-