General
-
Target
a1984fbfacc51f3a9d02445ac3c927f62809779448545ea9e07936c18f36aaf6
-
Size
2.1MB
-
Sample
240522-d4kvnaag33
-
MD5
d63c7ff0088348f29d4423f79497e61c
-
SHA1
ad18601c2b032b87bac73ec25cdfd51402ef73e6
-
SHA256
a1984fbfacc51f3a9d02445ac3c927f62809779448545ea9e07936c18f36aaf6
-
SHA512
16952b177d0cc721b66c1ffe087ab1c3b3f8fa016fd3bbd051441ebb1ab85247fdd3ef86f882579d5a311c738b71008091927f5abf4b09b7cffe14b8ef58f7b4
-
SSDEEP
49152:N6uDuaS9refmAJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9jAtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
a1984fbfacc51f3a9d02445ac3c927f62809779448545ea9e07936c18f36aaf6.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
a1984fbfacc51f3a9d02445ac3c927f62809779448545ea9e07936c18f36aaf6
-
Size
2.1MB
-
MD5
d63c7ff0088348f29d4423f79497e61c
-
SHA1
ad18601c2b032b87bac73ec25cdfd51402ef73e6
-
SHA256
a1984fbfacc51f3a9d02445ac3c927f62809779448545ea9e07936c18f36aaf6
-
SHA512
16952b177d0cc721b66c1ffe087ab1c3b3f8fa016fd3bbd051441ebb1ab85247fdd3ef86f882579d5a311c738b71008091927f5abf4b09b7cffe14b8ef58f7b4
-
SSDEEP
49152:N6uDuaS9refmAJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9jAtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-