General
-
Target
1cd747be5f3d8ff13d1eed13aaef92997497912479fcfede5898425bc34cba82
-
Size
2.1MB
-
Sample
240522-bq3r7sga5s
-
MD5
84bf44fef9cc04cdb5af55681c5823e2
-
SHA1
533d9c14601b17eb128c95a0c77d83a09c9e3e98
-
SHA256
1cd747be5f3d8ff13d1eed13aaef92997497912479fcfede5898425bc34cba82
-
SHA512
2a9f373e920f715a312ba958439a8cd2634823e3c9bb6bc322f8b6a8813cd1fd00617fbc289f2bebcf2d9bf4dc7b22e49fb0c3bc00cba84a97aa246f0aeb6cf2
-
SSDEEP
49152:N6uDuaS9refygJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9HgtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
1cd747be5f3d8ff13d1eed13aaef92997497912479fcfede5898425bc34cba82.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
1cd747be5f3d8ff13d1eed13aaef92997497912479fcfede5898425bc34cba82
-
Size
2.1MB
-
MD5
84bf44fef9cc04cdb5af55681c5823e2
-
SHA1
533d9c14601b17eb128c95a0c77d83a09c9e3e98
-
SHA256
1cd747be5f3d8ff13d1eed13aaef92997497912479fcfede5898425bc34cba82
-
SHA512
2a9f373e920f715a312ba958439a8cd2634823e3c9bb6bc322f8b6a8813cd1fd00617fbc289f2bebcf2d9bf4dc7b22e49fb0c3bc00cba84a97aa246f0aeb6cf2
-
SSDEEP
49152:N6uDuaS9refygJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9HgtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-