General
-
Target
21503e0c8c9f454260c08a20aedf0d6a633103ffe1feccdb9efdb9ceb7b317de
-
Size
2.0MB
-
Sample
240522-2s1nqsca85
-
MD5
e033a5ed3c75d01096c660013193bccc
-
SHA1
0d47a0eb6a6fbd0997fcad076baa7f002a81358b
-
SHA256
21503e0c8c9f454260c08a20aedf0d6a633103ffe1feccdb9efdb9ceb7b317de
-
SHA512
d3da7e1aa439fe33a542019a0328fdb2f138c1753d9e8425fcd17b7863613c323a590371c415756ef757851c95e7fe8cf16bebb93d2aa7ec0cfb1fbdee9284c0
-
SSDEEP
49152:7QzHt472DpJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtbtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
21503e0c8c9f454260c08a20aedf0d6a633103ffe1feccdb9efdb9ceb7b317de.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
21503e0c8c9f454260c08a20aedf0d6a633103ffe1feccdb9efdb9ceb7b317de
-
Size
2.0MB
-
MD5
e033a5ed3c75d01096c660013193bccc
-
SHA1
0d47a0eb6a6fbd0997fcad076baa7f002a81358b
-
SHA256
21503e0c8c9f454260c08a20aedf0d6a633103ffe1feccdb9efdb9ceb7b317de
-
SHA512
d3da7e1aa439fe33a542019a0328fdb2f138c1753d9e8425fcd17b7863613c323a590371c415756ef757851c95e7fe8cf16bebb93d2aa7ec0cfb1fbdee9284c0
-
SSDEEP
49152:7QzHt472DpJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtbtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-