General
-
Target
bd19fc03b7de2b1489e67944d221f37b.bin
-
Size
295KB
-
Sample
240517-ds2n2aeg9w
-
MD5
baa96f24016f7fb3d8f71b745cfdb644
-
SHA1
23086cf84299d6977c7cc216ea2fe5f74ecf90b2
-
SHA256
1c4c72e8e0391926b4d7b7e773925d53d132f638c9544ca84f7403cce5c10e20
-
SHA512
c29ccacfffd610457e7e83523fcbc0e3a93dc62e438afe39bc161d450fe3dada4a43160c2434bd0147a4ca046a578172caa1996f7b179d1324d60fa3d914739a
-
SSDEEP
6144:zs+bZp4ycnxED48/FUAi2CQeWlWvTe3G+SHHA35r:5p47nSDl/WhVQp26zSHHApr
Static task
static1
Behavioral task
behavioral1
Sample
c49f3891c5f1168f59eccfec2dfd503fda8f321a7a7cfc81e1edad027854edc0.exe
Resource
win7-20240215-en
Malware Config
Extracted
stealc
Targets
-
-
Target
c49f3891c5f1168f59eccfec2dfd503fda8f321a7a7cfc81e1edad027854edc0.exe
-
Size
377KB
-
MD5
bd19fc03b7de2b1489e67944d221f37b
-
SHA1
7046b966d868ccfbb5a5ae14c1a448771c4675ff
-
SHA256
c49f3891c5f1168f59eccfec2dfd503fda8f321a7a7cfc81e1edad027854edc0
-
SHA512
15f235b10579ca4779784ac412d33dee74e681bcba4def798aca3f4f94638f3ba5d196eb9078cdfaafeed61073c815e9cc9a53c762d28498787b951f6e58fd05
-
SSDEEP
6144:0aUkK6bywW0nlLbFqrcB+BGiq9rDPnCLNTWKIFxXRZYg8lVZQekb4n16pqG+3oe:0VAbTW0nlLoI4QnCyFxSlD8b4nQN
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-