General
-
Target
9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01
-
Size
2.1MB
-
Sample
240522-cbebqsgg8z
-
MD5
e80400f40e148f56c7a8939afd9ce692
-
SHA1
6d3f7c931086aea55842b88a4f01a3d4fec341c7
-
SHA256
9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01
-
SHA512
d80955c78718a9fbcd5b8da60a0b06536ca281b421626960a1274584e525768c2426745ab7b9cddc7d06eb04c89b7fd0cd84db8b9a7e41c67bc11550b69f0260
-
SSDEEP
49152:N6uDuaS9refe0JtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9r0tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01
-
Size
2.1MB
-
MD5
e80400f40e148f56c7a8939afd9ce692
-
SHA1
6d3f7c931086aea55842b88a4f01a3d4fec341c7
-
SHA256
9bee1839332630cbc3b1574eb99f3e2c00c7f94622e13e3b2465e0c1cd30fe01
-
SHA512
d80955c78718a9fbcd5b8da60a0b06536ca281b421626960a1274584e525768c2426745ab7b9cddc7d06eb04c89b7fd0cd84db8b9a7e41c67bc11550b69f0260
-
SSDEEP
49152:N6uDuaS9refe0JtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9r0tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-