General
-
Target
3d78a99c4ca146da6281b4d37bae957e17b23c1439b72daac8584df46179bbfe
-
Size
2.1MB
-
Sample
240521-s9em6aah45
-
MD5
d2f26faa6e51839385b5b7bb9c8bdf94
-
SHA1
e35b9e92219faae2f10c6a67c5c450f1d0bf8a75
-
SHA256
3d78a99c4ca146da6281b4d37bae957e17b23c1439b72daac8584df46179bbfe
-
SHA512
34d85b01650375b1a1bfad518cd1ce920cf9e4b773f01381a5a493a1166a64fb944be3afa7a2fbee79e83803f9f3e9aa64b378f16949ca94c6fab7d537339d99
-
SSDEEP
49152:N6uDuaS9refuIJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9TItIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
3d78a99c4ca146da6281b4d37bae957e17b23c1439b72daac8584df46179bbfe.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
3d78a99c4ca146da6281b4d37bae957e17b23c1439b72daac8584df46179bbfe
-
Size
2.1MB
-
MD5
d2f26faa6e51839385b5b7bb9c8bdf94
-
SHA1
e35b9e92219faae2f10c6a67c5c450f1d0bf8a75
-
SHA256
3d78a99c4ca146da6281b4d37bae957e17b23c1439b72daac8584df46179bbfe
-
SHA512
34d85b01650375b1a1bfad518cd1ce920cf9e4b773f01381a5a493a1166a64fb944be3afa7a2fbee79e83803f9f3e9aa64b378f16949ca94c6fab7d537339d99
-
SSDEEP
49152:N6uDuaS9refuIJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9TItIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-