General
-
Target
fffe0623931a7480a8400340dca70043ae14be3d2334e6f469d23c54e166520d
-
Size
2.0MB
-
Sample
240520-ts9bwahe61
-
MD5
2f21aa42326d2118a35b90caf996ae72
-
SHA1
0e0977d4a023faab7ea8fe115adeddcfe20f728d
-
SHA256
fffe0623931a7480a8400340dca70043ae14be3d2334e6f469d23c54e166520d
-
SHA512
350a3807708c5276891436126fd00458c5fe3424e06ba91e4e5355fad9fba918e70c730259d52f73cacd3f8e0d9dd46524538da15729b06e5eb312e3ebe2313f
-
SSDEEP
49152:IFno/jfAJtTF+TxMoxc1TU+j+dAzGkiT:IFno/j4tIuoITsdZT
Static task
static1
Behavioral task
behavioral1
Sample
fffe0623931a7480a8400340dca70043ae14be3d2334e6f469d23c54e166520d.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
fffe0623931a7480a8400340dca70043ae14be3d2334e6f469d23c54e166520d
-
Size
2.0MB
-
MD5
2f21aa42326d2118a35b90caf996ae72
-
SHA1
0e0977d4a023faab7ea8fe115adeddcfe20f728d
-
SHA256
fffe0623931a7480a8400340dca70043ae14be3d2334e6f469d23c54e166520d
-
SHA512
350a3807708c5276891436126fd00458c5fe3424e06ba91e4e5355fad9fba918e70c730259d52f73cacd3f8e0d9dd46524538da15729b06e5eb312e3ebe2313f
-
SSDEEP
49152:IFno/jfAJtTF+TxMoxc1TU+j+dAzGkiT:IFno/j4tIuoITsdZT
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-