General
-
Target
3df75a9f8892910a5afa7af4e6cca08b57fb29d6dab63ddb8b2cf1402f02efbf
-
Size
2.0MB
-
Sample
240522-3msllsdd7y
-
MD5
7007b2bac4a019b2f3f4c691f9fe0841
-
SHA1
8c172c309d909dfe4bf08c916b970fdb23fa2891
-
SHA256
3df75a9f8892910a5afa7af4e6cca08b57fb29d6dab63ddb8b2cf1402f02efbf
-
SHA512
b693f771f2e86c8b48de9d4d860c2b2fb244340bcfbd4c0c0abe2101333554eb6dd1b316ac831dcd83ae777e3f408eda39cb1ec0d1939520ff727517e0ecdb93
-
SSDEEP
49152:7QzHt472DWJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtUtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
3df75a9f8892910a5afa7af4e6cca08b57fb29d6dab63ddb8b2cf1402f02efbf.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
3df75a9f8892910a5afa7af4e6cca08b57fb29d6dab63ddb8b2cf1402f02efbf
-
Size
2.0MB
-
MD5
7007b2bac4a019b2f3f4c691f9fe0841
-
SHA1
8c172c309d909dfe4bf08c916b970fdb23fa2891
-
SHA256
3df75a9f8892910a5afa7af4e6cca08b57fb29d6dab63ddb8b2cf1402f02efbf
-
SHA512
b693f771f2e86c8b48de9d4d860c2b2fb244340bcfbd4c0c0abe2101333554eb6dd1b316ac831dcd83ae777e3f408eda39cb1ec0d1939520ff727517e0ecdb93
-
SSDEEP
49152:7QzHt472DWJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtUtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-