General
-
Target
bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45
-
Size
2.0MB
-
Sample
240520-x965maea76
-
MD5
bb874688b123e8843616a022dff6720e
-
SHA1
a9e1869608531551a033133e69a97dff68e51af7
-
SHA256
bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45
-
SHA512
ec25376b516f4ce0c558c877e0c6a0f1e5efcf6eed1c196d0a8006a57da0e914711eff86b9645c7ceec4d07febe591cbecbdc708e9b3b1263d2215169aee68d9
-
SSDEEP
49152:IFno/jfcJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jUtIuoITsdZT
Static task
static1
Behavioral task
behavioral1
Sample
bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45
-
Size
2.0MB
-
MD5
bb874688b123e8843616a022dff6720e
-
SHA1
a9e1869608531551a033133e69a97dff68e51af7
-
SHA256
bb1bf98277f2f971ef5dd3d084b76db78e415aa3e43f67c069908eb4fd959a45
-
SHA512
ec25376b516f4ce0c558c877e0c6a0f1e5efcf6eed1c196d0a8006a57da0e914711eff86b9645c7ceec4d07febe591cbecbdc708e9b3b1263d2215169aee68d9
-
SSDEEP
49152:IFno/jfcJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jUtIuoITsdZT
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-