General
-
Target
24f0a62ddd36f2a4d860c60c7f5482953cb20e205a4c8be14b7ce355fa946045
-
Size
2.2MB
-
Sample
240629-2xgfnasbpm
-
MD5
f74f76d3622a9620f5d3fe864734d9aa
-
SHA1
2cc92fab0adb06a3972dae599a12fcfcc5d7aa44
-
SHA256
24f0a62ddd36f2a4d860c60c7f5482953cb20e205a4c8be14b7ce355fa946045
-
SHA512
3755559937ffe0ed4fec62b05c499f9b2585380b359284d6f3beb5d495c076f5c82a7c0378260117d2edd7ce072aa1554dc90061d71b9b47361aca2f71aec9a2
-
SSDEEP
49152:qpjNvr9ySAOmw41HHO+SASagXkJr4MDkUwm:qpjNp7p41HH8n5A
Static task
static1
Behavioral task
behavioral1
Sample
24f0a62ddd36f2a4d860c60c7f5482953cb20e205a4c8be14b7ce355fa946045.exe
Resource
win7-20231129-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
24f0a62ddd36f2a4d860c60c7f5482953cb20e205a4c8be14b7ce355fa946045
-
Size
2.2MB
-
MD5
f74f76d3622a9620f5d3fe864734d9aa
-
SHA1
2cc92fab0adb06a3972dae599a12fcfcc5d7aa44
-
SHA256
24f0a62ddd36f2a4d860c60c7f5482953cb20e205a4c8be14b7ce355fa946045
-
SHA512
3755559937ffe0ed4fec62b05c499f9b2585380b359284d6f3beb5d495c076f5c82a7c0378260117d2edd7ce072aa1554dc90061d71b9b47361aca2f71aec9a2
-
SSDEEP
49152:qpjNvr9ySAOmw41HHO+SASagXkJr4MDkUwm:qpjNp7p41HH8n5A
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-