General
-
Target
62a41275ae9a811e0315b367afd7572a2ccfec5d54bb86e50e2c428711a0b934
-
Size
2.0MB
-
Sample
240522-318vraeb35
-
MD5
27ee06870d559a2918a05bb2560692d2
-
SHA1
adc60fac58de0b87643cbb3bb256df474fd8de1b
-
SHA256
62a41275ae9a811e0315b367afd7572a2ccfec5d54bb86e50e2c428711a0b934
-
SHA512
b8067d870f80e33cba9b44b35f8d3f682fbbebd71815493776c282733ebce38fc34fbccaa6d4447b967d7c230470aa7e62b50bb6f6ecb10164b405b15d51d488
-
SSDEEP
49152:7QzHt472DXJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt9tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
62a41275ae9a811e0315b367afd7572a2ccfec5d54bb86e50e2c428711a0b934.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
62a41275ae9a811e0315b367afd7572a2ccfec5d54bb86e50e2c428711a0b934
-
Size
2.0MB
-
MD5
27ee06870d559a2918a05bb2560692d2
-
SHA1
adc60fac58de0b87643cbb3bb256df474fd8de1b
-
SHA256
62a41275ae9a811e0315b367afd7572a2ccfec5d54bb86e50e2c428711a0b934
-
SHA512
b8067d870f80e33cba9b44b35f8d3f682fbbebd71815493776c282733ebce38fc34fbccaa6d4447b967d7c230470aa7e62b50bb6f6ecb10164b405b15d51d488
-
SSDEEP
49152:7QzHt472DXJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt9tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-