General
-
Target
17be39c9dff80cdf10cab260bafd3b6b51a871ab8d6d2cd3a4449dc7d7a72915
-
Size
2.2MB
-
Sample
240630-nv6qwaxckd
-
MD5
ed1448ea7e2c00e448b6de9818ccf06d
-
SHA1
b66b3088bfff4d6c240f9141fc972f7d2e71a62b
-
SHA256
17be39c9dff80cdf10cab260bafd3b6b51a871ab8d6d2cd3a4449dc7d7a72915
-
SHA512
a23a1dd11e06d3f48d61d07b3f8618405c62bc7df260c8c731841aa751e09377a57fc9d42dcd271cd16f8ac16f04dc31a015c6fa48fdd63663cc55015b3b9cf9
-
SSDEEP
24576:Uc0PyhhGkCI1wUL24jtYkYGbawg757CgXueAgXzAU2MZQti1u8LnsDJY6WpEYGYG:UJ0hsA91MPL21tuuIeNHYGY0LzjsJxK
Static task
static1
Behavioral task
behavioral1
Sample
17be39c9dff80cdf10cab260bafd3b6b51a871ab8d6d2cd3a4449dc7d7a72915.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
17be39c9dff80cdf10cab260bafd3b6b51a871ab8d6d2cd3a4449dc7d7a72915
-
Size
2.2MB
-
MD5
ed1448ea7e2c00e448b6de9818ccf06d
-
SHA1
b66b3088bfff4d6c240f9141fc972f7d2e71a62b
-
SHA256
17be39c9dff80cdf10cab260bafd3b6b51a871ab8d6d2cd3a4449dc7d7a72915
-
SHA512
a23a1dd11e06d3f48d61d07b3f8618405c62bc7df260c8c731841aa751e09377a57fc9d42dcd271cd16f8ac16f04dc31a015c6fa48fdd63663cc55015b3b9cf9
-
SSDEEP
24576:Uc0PyhhGkCI1wUL24jtYkYGbawg757CgXueAgXzAU2MZQti1u8LnsDJY6WpEYGYG:UJ0hsA91MPL21tuuIeNHYGY0LzjsJxK
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-