General
-
Target
33ab7b9e7719eb9554efe1a5b163c168cd11fc57587710a12737d95a25c1af44
-
Size
2.0MB
-
Sample
240522-w1kdtsbh54
-
MD5
8eb51c2790222337692425c65882269b
-
SHA1
b405d8517fbb8e62c9e096663a9807c843404faf
-
SHA256
33ab7b9e7719eb9554efe1a5b163c168cd11fc57587710a12737d95a25c1af44
-
SHA512
076e5089c6a649e3448e8af6282ba51289e97a387487a64fd90ee317189546240027b2f341b1a9170c68b75bb99639b84fded22321852a36a2ad7e4887c28b37
-
SSDEEP
49152:7QzHt472DpJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt/tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
33ab7b9e7719eb9554efe1a5b163c168cd11fc57587710a12737d95a25c1af44.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
33ab7b9e7719eb9554efe1a5b163c168cd11fc57587710a12737d95a25c1af44
-
Size
2.0MB
-
MD5
8eb51c2790222337692425c65882269b
-
SHA1
b405d8517fbb8e62c9e096663a9807c843404faf
-
SHA256
33ab7b9e7719eb9554efe1a5b163c168cd11fc57587710a12737d95a25c1af44
-
SHA512
076e5089c6a649e3448e8af6282ba51289e97a387487a64fd90ee317189546240027b2f341b1a9170c68b75bb99639b84fded22321852a36a2ad7e4887c28b37
-
SSDEEP
49152:7QzHt472DpJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt/tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-