General
-
Target
4ca212f4155f208d48f4a16149286eb810c87500d9c15d958ce7ae2835c22f42.exe
-
Size
2.0MB
-
Sample
240522-x61hnsdg52
-
MD5
0983feada2901e346361c96c0925e125
-
SHA1
5ff315892a946e1f4fb788456f48ad701b167b68
-
SHA256
4ca212f4155f208d48f4a16149286eb810c87500d9c15d958ce7ae2835c22f42
-
SHA512
6596aa6f48d71ba82db7d4f8827acb54669c95ee59d63820c73d0509cf69ac35d75968dd516c876d84af3c09ada0bf24d9b4686ed70e3c26afa65eb99909d426
-
SSDEEP
49152:7QzHt472DrJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtFtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
4ca212f4155f208d48f4a16149286eb810c87500d9c15d958ce7ae2835c22f42.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
4ca212f4155f208d48f4a16149286eb810c87500d9c15d958ce7ae2835c22f42.exe
-
Size
2.0MB
-
MD5
0983feada2901e346361c96c0925e125
-
SHA1
5ff315892a946e1f4fb788456f48ad701b167b68
-
SHA256
4ca212f4155f208d48f4a16149286eb810c87500d9c15d958ce7ae2835c22f42
-
SHA512
6596aa6f48d71ba82db7d4f8827acb54669c95ee59d63820c73d0509cf69ac35d75968dd516c876d84af3c09ada0bf24d9b4686ed70e3c26afa65eb99909d426
-
SSDEEP
49152:7QzHt472DrJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtFtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-