General
-
Target
ControlledAccessPoint.exe.zip
-
Size
466KB
-
Sample
241025-x1a1ts1jhj
-
MD5
1e2053d4cfc688bc63973f3d18b1e00f
-
SHA1
7529e740ae73ea65b507e68c2cad107725f78ad6
-
SHA256
baea231a54de7cc9e3d2613f313eaeefde8fc62ae66e283d7e15e887d2d8d7e6
-
SHA512
b7ced408d342b7948fe07aa18915724492d2dfafbdca4a8e4369959aafbcde8af88c34b0e76877486d15a66a41cb79407cdaa83cedf7092f59d1cac6d8f5286d
-
SSDEEP
6144:s8dj8NusAbUE04vKVvFnpvyakp3+NbOmAEH6kB7/yQB/2LTMqaPvncVq:s8GNn204vKrpvypR66mAEPB7/YMP3oq
Static task
static1
Behavioral task
behavioral1
Sample
ControlledAccessPoint.exe.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ControlledAccessPoint.exe.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11
2ee1445fc63bc20d0e7966867b13e0e1
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Targets
-
-
Target
ControlledAccessPoint.exe.zip
-
Size
466KB
-
MD5
1e2053d4cfc688bc63973f3d18b1e00f
-
SHA1
7529e740ae73ea65b507e68c2cad107725f78ad6
-
SHA256
baea231a54de7cc9e3d2613f313eaeefde8fc62ae66e283d7e15e887d2d8d7e6
-
SHA512
b7ced408d342b7948fe07aa18915724492d2dfafbdca4a8e4369959aafbcde8af88c34b0e76877486d15a66a41cb79407cdaa83cedf7092f59d1cac6d8f5286d
-
SSDEEP
6144:s8dj8NusAbUE04vKVvFnpvyakp3+NbOmAEH6kB7/yQB/2LTMqaPvncVq:s8GNn204vKrpvypR66mAEPB7/YMP3oq
-
Detect Vidar Stealer
-
Vidar family
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-