General
-
Target
75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972
-
Size
2.1MB
-
Sample
240522-dldzdsad7v
-
MD5
a760af5f48962d6a6152c2dd0cb3bd56
-
SHA1
cde8e2a62a4feb5d7559eeee649196568d1e7ade
-
SHA256
75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972
-
SHA512
2cda1731e286f178c7ecc9550d149ce1df3dd91bb1457e0149e0867167c5c237e620c0bff1534e72d9f60773a08964ed265ab8cf5de99d7114094f8e50bc0b82
-
SSDEEP
49152:N6uDuaS9refKAJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9XAtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972
-
Size
2.1MB
-
MD5
a760af5f48962d6a6152c2dd0cb3bd56
-
SHA1
cde8e2a62a4feb5d7559eeee649196568d1e7ade
-
SHA256
75d3612b324e57b29755f8bee2dfe6372ff171ce161fa9f2bebcfb4bc8f05972
-
SHA512
2cda1731e286f178c7ecc9550d149ce1df3dd91bb1457e0149e0867167c5c237e620c0bff1534e72d9f60773a08964ed265ab8cf5de99d7114094f8e50bc0b82
-
SSDEEP
49152:N6uDuaS9refKAJtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9XAtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-