General
-
Target
eed0c4c875d24f52620aae65d03f3341c585762a9bd331220f60dce84ada3184
-
Size
2.0MB
-
Sample
240522-1mxjfshh8z
-
MD5
d7b59f7cdad358a9bf6208af08e4e23f
-
SHA1
eae76e21628cbf0b5a51edf91636f769ec600df8
-
SHA256
eed0c4c875d24f52620aae65d03f3341c585762a9bd331220f60dce84ada3184
-
SHA512
b7063e3933178e8256c3fbc96e2d920b1759edc5eaf3148e1d122567c0b9de41e2001ec5e26a1da90141092804e5af2f633372b3c9d10891e8fd8e39228c2119
-
SSDEEP
49152:7QzHt472DAJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtetIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
eed0c4c875d24f52620aae65d03f3341c585762a9bd331220f60dce84ada3184.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
eed0c4c875d24f52620aae65d03f3341c585762a9bd331220f60dce84ada3184
-
Size
2.0MB
-
MD5
d7b59f7cdad358a9bf6208af08e4e23f
-
SHA1
eae76e21628cbf0b5a51edf91636f769ec600df8
-
SHA256
eed0c4c875d24f52620aae65d03f3341c585762a9bd331220f60dce84ada3184
-
SHA512
b7063e3933178e8256c3fbc96e2d920b1759edc5eaf3148e1d122567c0b9de41e2001ec5e26a1da90141092804e5af2f633372b3c9d10891e8fd8e39228c2119
-
SSDEEP
49152:7QzHt472DAJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtetIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-