General
-
Target
917ea94350f22c3c0dbb935090db6d6a180d22d1f6e46f447c85fe196b14a3e1
-
Size
2.1MB
-
Sample
240522-dx3rwsae88
-
MD5
502a8628ac9f42b8258d3ee440d58db8
-
SHA1
ef7ff1d96bd374807b88a7a0f96cf49c49fe3309
-
SHA256
917ea94350f22c3c0dbb935090db6d6a180d22d1f6e46f447c85fe196b14a3e1
-
SHA512
673d52851e2cecc4220c3b7ddb4dc3f200ab8ceddb01df80f94f181c0dd53d95caa0006f1ea2e7bfc3f1e323278e75dab043849078ab5935d1126f73966ad96b
-
SSDEEP
49152:N6uDuaS9refi8JtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9H8tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
917ea94350f22c3c0dbb935090db6d6a180d22d1f6e46f447c85fe196b14a3e1.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
917ea94350f22c3c0dbb935090db6d6a180d22d1f6e46f447c85fe196b14a3e1
-
Size
2.1MB
-
MD5
502a8628ac9f42b8258d3ee440d58db8
-
SHA1
ef7ff1d96bd374807b88a7a0f96cf49c49fe3309
-
SHA256
917ea94350f22c3c0dbb935090db6d6a180d22d1f6e46f447c85fe196b14a3e1
-
SHA512
673d52851e2cecc4220c3b7ddb4dc3f200ab8ceddb01df80f94f181c0dd53d95caa0006f1ea2e7bfc3f1e323278e75dab043849078ab5935d1126f73966ad96b
-
SSDEEP
49152:N6uDuaS9refi8JtTF+TxMoxc1TU+j+dAzGwlrh:N6uKb9H8tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-