General
-
Target
file.exe
-
Size
829KB
-
Sample
240516-yqc8wadh4z
-
MD5
589a60e0782a9d79f71102e03213392e
-
SHA1
48699baa16fc331a390536cad01cba0cd083b8da
-
SHA256
def454f0d1da69d6c01caed4c7c1894441ba72e8153a9b4058f4407007aaf578
-
SHA512
b395051eb11e2bb396a427f4896e0d80d4c8298e5a31b50193aee802d4123b32fad0ccf9fc69ac7cee53e5462ba81079355f14eac57baf7e42a91143dee7e088
-
SSDEEP
24576:WhLNAyNC5zV+QQtOidEbPsYmy6MmBa1QoUTw7c54zIBo6B93nUDR1/2:WhxCH+QQtOiGbPsYUa1FOw3kBo633UtU
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
Targets
-
-
Target
file.exe
-
Size
829KB
-
MD5
589a60e0782a9d79f71102e03213392e
-
SHA1
48699baa16fc331a390536cad01cba0cd083b8da
-
SHA256
def454f0d1da69d6c01caed4c7c1894441ba72e8153a9b4058f4407007aaf578
-
SHA512
b395051eb11e2bb396a427f4896e0d80d4c8298e5a31b50193aee802d4123b32fad0ccf9fc69ac7cee53e5462ba81079355f14eac57baf7e42a91143dee7e088
-
SSDEEP
24576:WhLNAyNC5zV+QQtOidEbPsYmy6MmBa1QoUTw7c54zIBo6B93nUDR1/2:WhxCH+QQtOiGbPsYUa1FOw3kBo633UtU
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-