General
-
Target
8b74d67261de5dc02f41ecd991d53d8c246c464220633dcf4571cf91780e2f5f
-
Size
2.0MB
-
Sample
240522-xqwjsada98
-
MD5
0450171442b7d32e194045b7d5f41d97
-
SHA1
35f9433dd36779a7eae14d25f0206ad530613e03
-
SHA256
8b74d67261de5dc02f41ecd991d53d8c246c464220633dcf4571cf91780e2f5f
-
SHA512
5b5d41adb72ec419c6ee7b47c488143e4d262698542c988ddd5384aa4ec103d34cd30acdc74aa99d06810d826ac03779f2d38fddf3510b9efd91f8bbc1c6b483
-
SSDEEP
49152:7QzHt472DPJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHthtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
8b74d67261de5dc02f41ecd991d53d8c246c464220633dcf4571cf91780e2f5f.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
8b74d67261de5dc02f41ecd991d53d8c246c464220633dcf4571cf91780e2f5f
-
Size
2.0MB
-
MD5
0450171442b7d32e194045b7d5f41d97
-
SHA1
35f9433dd36779a7eae14d25f0206ad530613e03
-
SHA256
8b74d67261de5dc02f41ecd991d53d8c246c464220633dcf4571cf91780e2f5f
-
SHA512
5b5d41adb72ec419c6ee7b47c488143e4d262698542c988ddd5384aa4ec103d34cd30acdc74aa99d06810d826ac03779f2d38fddf3510b9efd91f8bbc1c6b483
-
SSDEEP
49152:7QzHt472DPJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHthtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-