General
-
Target
486568d6cc83219fb4e89702499f3c51059d39893a41b9cd5bf0084cb6e3a507
-
Size
2.0MB
-
Sample
240523-b47cjshc66
-
MD5
41ffcdb106d244f4e99cb413931a4fcd
-
SHA1
f33eee4ddc0b31fce155236e1ef3711e257a2503
-
SHA256
486568d6cc83219fb4e89702499f3c51059d39893a41b9cd5bf0084cb6e3a507
-
SHA512
e2cc7afbf8f3996a65e9127a4f694cb5b78a31b08118bea4cf475b03ddae5b1eb038cf0837f6139d91923a438478e4e281ec7d6a58018fef278316542cc371b9
-
SSDEEP
49152:7QzHt472DVJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt3tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
486568d6cc83219fb4e89702499f3c51059d39893a41b9cd5bf0084cb6e3a507.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
486568d6cc83219fb4e89702499f3c51059d39893a41b9cd5bf0084cb6e3a507
-
Size
2.0MB
-
MD5
41ffcdb106d244f4e99cb413931a4fcd
-
SHA1
f33eee4ddc0b31fce155236e1ef3711e257a2503
-
SHA256
486568d6cc83219fb4e89702499f3c51059d39893a41b9cd5bf0084cb6e3a507
-
SHA512
e2cc7afbf8f3996a65e9127a4f694cb5b78a31b08118bea4cf475b03ddae5b1eb038cf0837f6139d91923a438478e4e281ec7d6a58018fef278316542cc371b9
-
SSDEEP
49152:7QzHt472DVJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt3tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-