General
-
Target
5e2d565ced9589168469f45e1bf9f427747955b18098e2731c1572a4c1a04a99
-
Size
2.0MB
-
Sample
240523-actfyaec36
-
MD5
f6c82697c671911925eee19130f79f30
-
SHA1
24a5da82fa4f8fa33cc384a341438f67e7692e70
-
SHA256
5e2d565ced9589168469f45e1bf9f427747955b18098e2731c1572a4c1a04a99
-
SHA512
8557e8dd52f7e457db421527984929c61a36c6c01cecc1ea483706dcd6fa842150fcde11ed00810e7ccf3a60a8c849dcc9d7a8988f1b70b4b3a55ae9f2380b31
-
SSDEEP
49152:IFno/jfAJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jYtIuoITsdZT
Static task
static1
Behavioral task
behavioral1
Sample
5e2d565ced9589168469f45e1bf9f427747955b18098e2731c1572a4c1a04a99.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Targets
-
-
Target
5e2d565ced9589168469f45e1bf9f427747955b18098e2731c1572a4c1a04a99
-
Size
2.0MB
-
MD5
f6c82697c671911925eee19130f79f30
-
SHA1
24a5da82fa4f8fa33cc384a341438f67e7692e70
-
SHA256
5e2d565ced9589168469f45e1bf9f427747955b18098e2731c1572a4c1a04a99
-
SHA512
8557e8dd52f7e457db421527984929c61a36c6c01cecc1ea483706dcd6fa842150fcde11ed00810e7ccf3a60a8c849dcc9d7a8988f1b70b4b3a55ae9f2380b31
-
SSDEEP
49152:IFno/jfAJtTF+TxMoxc1TU+j+dAzGkiT:IFno/jYtIuoITsdZT
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-