General
-
Target
f3762122a80ea2c13c7bba845ec8cf682c138640110c997d4a399a07f35509ca
-
Size
2.0MB
-
Sample
240523-as4xlseh83
-
MD5
ebb567520e63719e70a1dd8bb117ec49
-
SHA1
d2e104c2cdab97b0e7f50535a2692bfb1811b1b5
-
SHA256
f3762122a80ea2c13c7bba845ec8cf682c138640110c997d4a399a07f35509ca
-
SHA512
787b1fa13926b0119b4319c040400c374b808d3c2e4685d8ee6e2220fe37cbc0afedefbbda43476632f1f7ad75e7ea7ddf4fee1f818823b9102f7b275a40bc78
-
SSDEEP
49152:7QzHt472DxJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtztIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
f3762122a80ea2c13c7bba845ec8cf682c138640110c997d4a399a07f35509ca.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
f3762122a80ea2c13c7bba845ec8cf682c138640110c997d4a399a07f35509ca
-
Size
2.0MB
-
MD5
ebb567520e63719e70a1dd8bb117ec49
-
SHA1
d2e104c2cdab97b0e7f50535a2692bfb1811b1b5
-
SHA256
f3762122a80ea2c13c7bba845ec8cf682c138640110c997d4a399a07f35509ca
-
SHA512
787b1fa13926b0119b4319c040400c374b808d3c2e4685d8ee6e2220fe37cbc0afedefbbda43476632f1f7ad75e7ea7ddf4fee1f818823b9102f7b275a40bc78
-
SSDEEP
49152:7QzHt472DxJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtztIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-