General
-
Target
6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5.exe
-
Size
2.0MB
-
Sample
240522-xzk5eadc9t
-
MD5
3d2827a97619c3aad1e1c03444df8c41
-
SHA1
4e29ca126bbd255d7ece151d937edbe12df43ee9
-
SHA256
6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5
-
SHA512
eda7b7f2a27c7391f5db2ec7fe3e256e95444859f6fb9f2421fd233b127eeb2ce18b64612bca9150fa957b76feebf0ae388949cc601d274292648e44ee0390c7
-
SSDEEP
49152:7QzHt472D3JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5.exe
Resource
win7-20240215-en
Malware Config
Extracted
stealc
Targets
-
-
Target
6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5.exe
-
Size
2.0MB
-
MD5
3d2827a97619c3aad1e1c03444df8c41
-
SHA1
4e29ca126bbd255d7ece151d937edbe12df43ee9
-
SHA256
6cb9b55719f469b27ea2e00ec9e033a095fe2082c672184b79c3a94fbab877b5
-
SHA512
eda7b7f2a27c7391f5db2ec7fe3e256e95444859f6fb9f2421fd233b127eeb2ce18b64612bca9150fa957b76feebf0ae388949cc601d274292648e44ee0390c7
-
SSDEEP
49152:7QzHt472D3JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-