General
-
Target
e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6
-
Size
2.0MB
-
Sample
240522-nvvnlsdf69
-
MD5
2742f8c319df53a1e335b40dc3e8772c
-
SHA1
134bf9e0a438cbd65c57668a954b12ee2b821374
-
SHA256
e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6
-
SHA512
38b1b55b1bea2cad69bb88d1dad3735fbb81059aba1b0f10d762fda93bd3a0762b505749897eba017d58a316fe1aadfb60e114f3612ab150c6000c25b43567d5
-
SSDEEP
49152:7QzHt472DaJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtUtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6
-
Size
2.0MB
-
MD5
2742f8c319df53a1e335b40dc3e8772c
-
SHA1
134bf9e0a438cbd65c57668a954b12ee2b821374
-
SHA256
e8d3f8d2eed68c24edb3d8e83fa79dc73e9d4ef758e996c381da6f3258daf4e6
-
SHA512
38b1b55b1bea2cad69bb88d1dad3735fbb81059aba1b0f10d762fda93bd3a0762b505749897eba017d58a316fe1aadfb60e114f3612ab150c6000c25b43567d5
-
SSDEEP
49152:7QzHt472DaJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtUtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-