General
-
Target
d91dd35b15998f708fb4864aaad94b563a6d508dc773cb9f6495e9ee061b6c2e
-
Size
2.0MB
-
Sample
240522-zlhhgagb65
-
MD5
475a47351c1c803db995a45db309616e
-
SHA1
bb07d4be98ff53f1c755848524c110ee4c9c50a3
-
SHA256
d91dd35b15998f708fb4864aaad94b563a6d508dc773cb9f6495e9ee061b6c2e
-
SHA512
dc7817c1314079b17837f57d3e19e0c6b4987e76124a5299060a81af0898de6e98152a9a0793417ab95a82dd608bc246377f10cf93a4a9f2e06d4b3c65138574
-
SSDEEP
49152:7QzHt472DfJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtFtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
d91dd35b15998f708fb4864aaad94b563a6d508dc773cb9f6495e9ee061b6c2e.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
d91dd35b15998f708fb4864aaad94b563a6d508dc773cb9f6495e9ee061b6c2e
-
Size
2.0MB
-
MD5
475a47351c1c803db995a45db309616e
-
SHA1
bb07d4be98ff53f1c755848524c110ee4c9c50a3
-
SHA256
d91dd35b15998f708fb4864aaad94b563a6d508dc773cb9f6495e9ee061b6c2e
-
SHA512
dc7817c1314079b17837f57d3e19e0c6b4987e76124a5299060a81af0898de6e98152a9a0793417ab95a82dd608bc246377f10cf93a4a9f2e06d4b3c65138574
-
SSDEEP
49152:7QzHt472DfJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtFtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-