General
-
Target
718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027.exe
-
Size
423KB
-
Sample
240522-b9kezagg3v
-
MD5
5afb193b8db7087705eca19e6fd17350
-
SHA1
961d484614c96070af1d5ba640899f4f95b64bba
-
SHA256
718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027
-
SHA512
197c06628f4b2f2298639a77116a886e949cea574f86d217eed7421430fa7f02504bb9a2e1c6a29a0b2d306d12c7fbd1e3ecbeef60fcedc67cd6bb25c42709c7
-
SSDEEP
6144:0qiuRraHLIo4V1p+a3VyZJ1PGor3dz1UKwETicnDQNk3KRks2P4f3P5CDaZwAZB6:6HLIoCo1zzNiKwEjnMCKRdH5o1AZm
Static task
static1
Behavioral task
behavioral1
Sample
718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Targets
-
-
Target
718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027.exe
-
Size
423KB
-
MD5
5afb193b8db7087705eca19e6fd17350
-
SHA1
961d484614c96070af1d5ba640899f4f95b64bba
-
SHA256
718f3ddfb33000759e207ae9f4b3118b34ce44f794749993f660fdcdf4dab027
-
SHA512
197c06628f4b2f2298639a77116a886e949cea574f86d217eed7421430fa7f02504bb9a2e1c6a29a0b2d306d12c7fbd1e3ecbeef60fcedc67cd6bb25c42709c7
-
SSDEEP
6144:0qiuRraHLIo4V1p+a3VyZJ1PGor3dz1UKwETicnDQNk3KRks2P4f3P5CDaZwAZB6:6HLIoCo1zzNiKwEjnMCKRdH5o1AZm
-
Detect Vidar Stealer
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables containing potential Windows Defender anti-emulation checks
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-