General
-
Target
5622051ab8add0244e859bb67a3ae6d4997007f691671aa5e10a1a02608d7640
-
Size
2.1MB
-
Sample
240521-spxm8sab34
-
MD5
bbba3d6eaa120f86d77d05e802ac139c
-
SHA1
45f45aa11ff1be0fcf1cf4399c4a06c5767153ec
-
SHA256
5622051ab8add0244e859bb67a3ae6d4997007f691671aa5e10a1a02608d7640
-
SHA512
903c6f2408bef1ec0a814c70b070018d0d0450ae7eaaf3e415efbe9cecbf8656fcfddddd4b5e5c5c0d1974f6fb48652bf3d9873f227683fd6e143312afc0723b
-
SSDEEP
49152:N6uDuaS9refCgJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9ngtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
5622051ab8add0244e859bb67a3ae6d4997007f691671aa5e10a1a02608d7640.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
5622051ab8add0244e859bb67a3ae6d4997007f691671aa5e10a1a02608d7640
-
Size
2.1MB
-
MD5
bbba3d6eaa120f86d77d05e802ac139c
-
SHA1
45f45aa11ff1be0fcf1cf4399c4a06c5767153ec
-
SHA256
5622051ab8add0244e859bb67a3ae6d4997007f691671aa5e10a1a02608d7640
-
SHA512
903c6f2408bef1ec0a814c70b070018d0d0450ae7eaaf3e415efbe9cecbf8656fcfddddd4b5e5c5c0d1974f6fb48652bf3d9873f227683fd6e143312afc0723b
-
SSDEEP
49152:N6uDuaS9refCgJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9ngtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-