General
-
Target
ac5be0e12802839366243997af6620e86ae4540a9bd888e1ac140323400095c1.exe
-
Size
422KB
-
Sample
240521-rv76gshc9w
-
MD5
834ea699f82aa32660cb329a96986165
-
SHA1
e8a5bf4ef04ac4dfaed563305c2c98223eabe46f
-
SHA256
ac5be0e12802839366243997af6620e86ae4540a9bd888e1ac140323400095c1
-
SHA512
3101a96ceedc1eda1090a34d6ac6aa26155958397f62bd6fbe02dd147010baf837ce406ce36c6a48f9134431a91bd5b722558aac64a4e9f9ffa92052bd9a27db
-
SSDEEP
12288:bxIhIkRoFQkVoVSInyeGrCwYP2CGS0uSq8:2IroUUH0CJ2CGo
Static task
static1
Behavioral task
behavioral1
Sample
ac5be0e12802839366243997af6620e86ae4540a9bd888e1ac140323400095c1.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
ac5be0e12802839366243997af6620e86ae4540a9bd888e1ac140323400095c1.exe
-
Size
422KB
-
MD5
834ea699f82aa32660cb329a96986165
-
SHA1
e8a5bf4ef04ac4dfaed563305c2c98223eabe46f
-
SHA256
ac5be0e12802839366243997af6620e86ae4540a9bd888e1ac140323400095c1
-
SHA512
3101a96ceedc1eda1090a34d6ac6aa26155958397f62bd6fbe02dd147010baf837ce406ce36c6a48f9134431a91bd5b722558aac64a4e9f9ffa92052bd9a27db
-
SSDEEP
12288:bxIhIkRoFQkVoVSInyeGrCwYP2CGS0uSq8:2IroUUH0CJ2CGo
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-