General
-
Target
33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48.exe
-
Size
865KB
-
Sample
250124-ezlf3azjcv
-
MD5
e7c964e5bd52da0b4ff1e6543608cf27
-
SHA1
b369051de7f7bdf58411fb604eef85507965abf2
-
SHA256
33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48
-
SHA512
651dd8f2fc6c4e0c479a03111334b054a0ac0c466256e48880c5a27ce77ef0900bd9ccbe7c16607b1f4c9fa3efc4b387ddc3b371c415715025bc188fd218eb48
-
SSDEEP
12288:gCxr3SAoHl8uj7c8BNV0CW9TBBMtVIN+9exmPh0LguCifyV03qGs7ifbVpBgYeSa:gcrCAY8uj7nGPFLWVIN+9e5iUDTq/Shk
Static task
static1
Behavioral task
behavioral1
Sample
33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48.exe
Resource
win7-20241010-en
Malware Config
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Targets
-
-
Target
33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48.exe
-
Size
865KB
-
MD5
e7c964e5bd52da0b4ff1e6543608cf27
-
SHA1
b369051de7f7bdf58411fb604eef85507965abf2
-
SHA256
33cab7cd9069c761a907a2498c2d496da5e9332412b13472710e774ca80c4b48
-
SHA512
651dd8f2fc6c4e0c479a03111334b054a0ac0c466256e48880c5a27ce77ef0900bd9ccbe7c16607b1f4c9fa3efc4b387ddc3b371c415715025bc188fd218eb48
-
SSDEEP
12288:gCxr3SAoHl8uj7c8BNV0CW9TBBMtVIN+9exmPh0LguCifyV03qGs7ifbVpBgYeSa:gcrCAY8uj7nGPFLWVIN+9e5iUDTq/Shk
-
Detect Vidar Stealer
-
Vidar family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-