General
-
Target
2bc86c01a656f0506a5ee92d1dffbc9af34fe774e2699a9ce61dfb55d3b4ce4b
-
Size
2.1MB
-
Sample
240522-ddwt8saa86
-
MD5
37d072b6df782b0cdbb602eece74467b
-
SHA1
a9505e3cbce279df518113570f6859009bde5b91
-
SHA256
2bc86c01a656f0506a5ee92d1dffbc9af34fe774e2699a9ce61dfb55d3b4ce4b
-
SHA512
6f5f0705000b7459872a43736b8eaf239a5e4ea534006264b337921f96c907f912319e8a173df65649870172eca34e39bb7788554372a9edf6ff878a997808ae
-
SSDEEP
49152:N6uDuaS9ref2gJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9rgtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
2bc86c01a656f0506a5ee92d1dffbc9af34fe774e2699a9ce61dfb55d3b4ce4b.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
2bc86c01a656f0506a5ee92d1dffbc9af34fe774e2699a9ce61dfb55d3b4ce4b
-
Size
2.1MB
-
MD5
37d072b6df782b0cdbb602eece74467b
-
SHA1
a9505e3cbce279df518113570f6859009bde5b91
-
SHA256
2bc86c01a656f0506a5ee92d1dffbc9af34fe774e2699a9ce61dfb55d3b4ce4b
-
SHA512
6f5f0705000b7459872a43736b8eaf239a5e4ea534006264b337921f96c907f912319e8a173df65649870172eca34e39bb7788554372a9edf6ff878a997808ae
-
SSDEEP
49152:N6uDuaS9ref2gJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9rgtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-