General
-
Target
183db4a550be4d6c7008092966f142bd7da5c1425dbf6b6efc935311c20254ed
-
Size
2.0MB
-
Sample
240522-xbn66acd84
-
MD5
e378859559b6525e7826e84db387d31f
-
SHA1
24fd06b38af87b631e92fb4b3df96e29150f05dd
-
SHA256
183db4a550be4d6c7008092966f142bd7da5c1425dbf6b6efc935311c20254ed
-
SHA512
4e9a1f4ba6251aeb591edc12c78cc240b0e28cc7ed219bb459bdcaedfefc1d1280d27102fe34f3bba95ed3673f2ee9ca0991f2cc06dfe58716aad5e8f04027ce
-
SSDEEP
49152:7QzHt472DLJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtBtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
183db4a550be4d6c7008092966f142bd7da5c1425dbf6b6efc935311c20254ed.exe
Resource
win7-20231129-en
Malware Config
Extracted
stealc
Targets
-
-
Target
183db4a550be4d6c7008092966f142bd7da5c1425dbf6b6efc935311c20254ed
-
Size
2.0MB
-
MD5
e378859559b6525e7826e84db387d31f
-
SHA1
24fd06b38af87b631e92fb4b3df96e29150f05dd
-
SHA256
183db4a550be4d6c7008092966f142bd7da5c1425dbf6b6efc935311c20254ed
-
SHA512
4e9a1f4ba6251aeb591edc12c78cc240b0e28cc7ed219bb459bdcaedfefc1d1280d27102fe34f3bba95ed3673f2ee9ca0991f2cc06dfe58716aad5e8f04027ce
-
SSDEEP
49152:7QzHt472DLJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtBtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-