General
-
Target
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce
-
Size
275KB
-
Sample
241201-kkyqqsypcv
-
MD5
0a7b3454fdad8431bd3523648c915665
-
SHA1
800a97a7c1a92a92cac76afc1fe5349895ee5287
-
SHA256
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce
-
SHA512
020e45eaeee083d6739155d9a821ab54dd07f1320b8efb73871ee5d29188122fdbb7d39b34a8b3694a8b0c08ae1801ec370e40ff8d837c9190a72905f26baff9
-
SSDEEP
6144:vh0ZpFC4sffny7TuLBdZlT4DIJYdy3g8ioyrN:vh0ZpFCfB3TGyYy3biBZ
Behavioral task
behavioral1
Sample
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.8
41d35cbb974bc2d1287dcd4381b4a2a8
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce
-
Size
275KB
-
MD5
0a7b3454fdad8431bd3523648c915665
-
SHA1
800a97a7c1a92a92cac76afc1fe5349895ee5287
-
SHA256
baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce
-
SHA512
020e45eaeee083d6739155d9a821ab54dd07f1320b8efb73871ee5d29188122fdbb7d39b34a8b3694a8b0c08ae1801ec370e40ff8d837c9190a72905f26baff9
-
SSDEEP
6144:vh0ZpFC4sffny7TuLBdZlT4DIJYdy3g8ioyrN:vh0ZpFCfB3TGyYy3biBZ
-
Detect Vidar Stealer
-
Stealc family
-
Vidar family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-