General
-
Target
0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49
-
Size
2.0MB
-
Sample
240522-xw995adc3v
-
MD5
51d67d469f3e921c8651b98eb8902f1c
-
SHA1
1940667e192ee5ea367b2a862fc1f68acab5cebc
-
SHA256
0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49
-
SHA512
5b4247c090a61178eb7092c0c0b98dce699a7bb66b806efc8ba1b75d682c5fc5b4ba7da1da63106fec8385f56cac7a2ba92d12ceba4adfbd1ceda0a244e13c3e
-
SSDEEP
49152:7QzHt472D8JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtKtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49
-
Size
2.0MB
-
MD5
51d67d469f3e921c8651b98eb8902f1c
-
SHA1
1940667e192ee5ea367b2a862fc1f68acab5cebc
-
SHA256
0e3282299e8f2f8f0846f7f62e2aa2630bff3c1f9f63254a7dec7ca2254e9d49
-
SHA512
5b4247c090a61178eb7092c0c0b98dce699a7bb66b806efc8ba1b75d682c5fc5b4ba7da1da63106fec8385f56cac7a2ba92d12ceba4adfbd1ceda0a244e13c3e
-
SSDEEP
49152:7QzHt472D8JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtKtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-