General
-
Target
041f1d3b90df4dd8310585c9e3e2e470044c4c3131f4b034f882d8c7a8c3a82f
-
Size
2.0MB
-
Sample
240520-2kc8gaaa24
-
MD5
f0f44f36d22189d0baff1af39a7a5d7b
-
SHA1
d695280a3cd377fc339898de3cb281ceab90ff3d
-
SHA256
041f1d3b90df4dd8310585c9e3e2e470044c4c3131f4b034f882d8c7a8c3a82f
-
SHA512
c1be8f54f9a1258266d2bd4af801176685c2d854519b30bc5faef4643dca2bea8eb1bec0bf599a0a178c5d9faac7e17b4a42e8273f58cb2341223de45a6e222d
-
SSDEEP
49152:IFno/jfwJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jotIuoITsdZT
Static task
static1
Behavioral task
behavioral1
Sample
041f1d3b90df4dd8310585c9e3e2e470044c4c3131f4b034f882d8c7a8c3a82f.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
041f1d3b90df4dd8310585c9e3e2e470044c4c3131f4b034f882d8c7a8c3a82f
-
Size
2.0MB
-
MD5
f0f44f36d22189d0baff1af39a7a5d7b
-
SHA1
d695280a3cd377fc339898de3cb281ceab90ff3d
-
SHA256
041f1d3b90df4dd8310585c9e3e2e470044c4c3131f4b034f882d8c7a8c3a82f
-
SHA512
c1be8f54f9a1258266d2bd4af801176685c2d854519b30bc5faef4643dca2bea8eb1bec0bf599a0a178c5d9faac7e17b4a42e8273f58cb2341223de45a6e222d
-
SSDEEP
49152:IFno/jfwJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jotIuoITsdZT
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-