General
-
Target
f4fd015353d1e19f7f7b648827bf55318b0acadf5c55105657c60c30bd7a6558
-
Size
2.0MB
-
Sample
240522-x4g9badf28
-
MD5
e6eb17823de36eacf740d38e5da90577
-
SHA1
bcfd91b6dd25952a7ce42bdebe1887e5b0ad64af
-
SHA256
f4fd015353d1e19f7f7b648827bf55318b0acadf5c55105657c60c30bd7a6558
-
SHA512
6ea4a8fffc0b2e6ee32dc2324e470531fa30b6adf798c3bc29b9e1bc6a2f9acdc02777a0aa2fdc2dbe9d4ac73ae3cdcb23bc8ae815a11c2e4800cf150787a0b4
-
SSDEEP
49152:7QzHt472DWJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtctIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
f4fd015353d1e19f7f7b648827bf55318b0acadf5c55105657c60c30bd7a6558.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
f4fd015353d1e19f7f7b648827bf55318b0acadf5c55105657c60c30bd7a6558
-
Size
2.0MB
-
MD5
e6eb17823de36eacf740d38e5da90577
-
SHA1
bcfd91b6dd25952a7ce42bdebe1887e5b0ad64af
-
SHA256
f4fd015353d1e19f7f7b648827bf55318b0acadf5c55105657c60c30bd7a6558
-
SHA512
6ea4a8fffc0b2e6ee32dc2324e470531fa30b6adf798c3bc29b9e1bc6a2f9acdc02777a0aa2fdc2dbe9d4ac73ae3cdcb23bc8ae815a11c2e4800cf150787a0b4
-
SSDEEP
49152:7QzHt472DWJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtctIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-