General
-
Target
4e3c562eff0b4bea108151b59db1e955a762d9162fec3dc765aceb3b1dc8bb56.exe
-
Size
2.0MB
-
Sample
240522-xhm8facf5s
-
MD5
a3b23a6f0e450ce1e9876abb6e75f5cd
-
SHA1
3484254a3dce93a72bf968452ec9f457341e996f
-
SHA256
4e3c562eff0b4bea108151b59db1e955a762d9162fec3dc765aceb3b1dc8bb56
-
SHA512
b6948f727f6f73e54daccfa545e4cdeec0c3a0f80713ba334136db41216fef3ab184a09c0b540f6e46e26a094cf00eeecac0a9128faedabafd6dbb0843b3371c
-
SSDEEP
49152:7QzHt472DpJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtXtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
4e3c562eff0b4bea108151b59db1e955a762d9162fec3dc765aceb3b1dc8bb56.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
Targets
-
-
Target
4e3c562eff0b4bea108151b59db1e955a762d9162fec3dc765aceb3b1dc8bb56.exe
-
Size
2.0MB
-
MD5
a3b23a6f0e450ce1e9876abb6e75f5cd
-
SHA1
3484254a3dce93a72bf968452ec9f457341e996f
-
SHA256
4e3c562eff0b4bea108151b59db1e955a762d9162fec3dc765aceb3b1dc8bb56
-
SHA512
b6948f727f6f73e54daccfa545e4cdeec0c3a0f80713ba334136db41216fef3ab184a09c0b540f6e46e26a094cf00eeecac0a9128faedabafd6dbb0843b3371c
-
SSDEEP
49152:7QzHt472DpJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtXtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-