General
-
Target
4263bde1b23b0124b475c08c4748daeb1b01eaf7d003b9450c69cdee25549d8d
-
Size
2.0MB
-
Sample
240523-a6tnssfe67
-
MD5
7ca41de791791686a7161f1fb243ef60
-
SHA1
30c5de84df33ae833cec1f990c7567b4abd140a1
-
SHA256
4263bde1b23b0124b475c08c4748daeb1b01eaf7d003b9450c69cdee25549d8d
-
SHA512
b181fc800e12eb597791bc10beb42b206f6fbe133427120750f219b3eee2bc8e1c8e908f2b75d09358b1740e844e9fadbe35c5d28de5738fc7f12fb58d4dc8b9
-
SSDEEP
49152:7QzHt472DIJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtCtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
4263bde1b23b0124b475c08c4748daeb1b01eaf7d003b9450c69cdee25549d8d.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
4263bde1b23b0124b475c08c4748daeb1b01eaf7d003b9450c69cdee25549d8d
-
Size
2.0MB
-
MD5
7ca41de791791686a7161f1fb243ef60
-
SHA1
30c5de84df33ae833cec1f990c7567b4abd140a1
-
SHA256
4263bde1b23b0124b475c08c4748daeb1b01eaf7d003b9450c69cdee25549d8d
-
SHA512
b181fc800e12eb597791bc10beb42b206f6fbe133427120750f219b3eee2bc8e1c8e908f2b75d09358b1740e844e9fadbe35c5d28de5738fc7f12fb58d4dc8b9
-
SSDEEP
49152:7QzHt472DIJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtCtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-