General
-
Target
83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c
-
Size
2.1MB
-
Sample
240521-sb7laahh4v
-
MD5
af73fc02520ba551b7308abbae99042c
-
SHA1
3550d1e297f6718baebc93c2734fc86f7c3c8c85
-
SHA256
83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c
-
SHA512
c1a1c71075130b175839956dc1bb68b0f44de2e545881f4ac19ed98a52e3b8602679721a4b34f7bc85ef840711a945aaac4ddcfb9118491e9b1c48c203525e4c
-
SSDEEP
49152:N6uDuaS9refusJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9rstIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c
-
Size
2.1MB
-
MD5
af73fc02520ba551b7308abbae99042c
-
SHA1
3550d1e297f6718baebc93c2734fc86f7c3c8c85
-
SHA256
83311b81ef97815b4751c8683d7aaf16f15589d470d359d36259d80748e7ad4c
-
SHA512
c1a1c71075130b175839956dc1bb68b0f44de2e545881f4ac19ed98a52e3b8602679721a4b34f7bc85ef840711a945aaac4ddcfb9118491e9b1c48c203525e4c
-
SSDEEP
49152:N6uDuaS9refusJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9rstIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-