General
-
Target
29dc8ffa9f422ee240ab3130fbeda0b31e97032c83225574b7a6a7d03610b9ca
-
Size
2.2MB
-
Sample
240630-qgg7ga1gqj
-
MD5
c12bf6e7248b11da2fa86e45b0dcb83f
-
SHA1
01e26b66e3035cec44ccd76c0c99c29bb9c0ba58
-
SHA256
29dc8ffa9f422ee240ab3130fbeda0b31e97032c83225574b7a6a7d03610b9ca
-
SHA512
e2df308fc7c78bd62e3796c2017c8b56abfca4a09f298eb5b0021b489ca808b3cfbe4b7bdc77b4e1304bb03446e9ce8e1b9568b24e3e6fef12aca4836412b4a7
-
SSDEEP
24576:Uc0PyhhGkCI1wUL24jtYkYGbawg757CgXueAgXH1U2MZQti1u8LnsDJY6WpEYGYG:UJ0hsA91MPK21tuuIeNHYGY0LzjsJxK
Static task
static1
Behavioral task
behavioral1
Sample
29dc8ffa9f422ee240ab3130fbeda0b31e97032c83225574b7a6a7d03610b9ca.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Targets
-
-
Target
29dc8ffa9f422ee240ab3130fbeda0b31e97032c83225574b7a6a7d03610b9ca
-
Size
2.2MB
-
MD5
c12bf6e7248b11da2fa86e45b0dcb83f
-
SHA1
01e26b66e3035cec44ccd76c0c99c29bb9c0ba58
-
SHA256
29dc8ffa9f422ee240ab3130fbeda0b31e97032c83225574b7a6a7d03610b9ca
-
SHA512
e2df308fc7c78bd62e3796c2017c8b56abfca4a09f298eb5b0021b489ca808b3cfbe4b7bdc77b4e1304bb03446e9ce8e1b9568b24e3e6fef12aca4836412b4a7
-
SSDEEP
24576:Uc0PyhhGkCI1wUL24jtYkYGbawg757CgXueAgXH1U2MZQti1u8LnsDJY6WpEYGYG:UJ0hsA91MPK21tuuIeNHYGY0LzjsJxK
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-