General
-
Target
0a456f0fee171826bb44c9c2e1d5e7b95c0862b67d9dd75a843dec035224bb74.exe
-
Size
355KB
-
Sample
240523-bfe86aga64
-
MD5
f4fb6b518e2e550467f533124e1f80f4
-
SHA1
964e735dd9410e07536e46b9f50c65fed148bcd7
-
SHA256
0a456f0fee171826bb44c9c2e1d5e7b95c0862b67d9dd75a843dec035224bb74
-
SHA512
4a02aa8aa87dab5d6aa14da695f71aa424b95bc4437c3b8353ac355e0a73f68ded2df49e6e2ca8af6e9389745861a78a7343ab4838a6584a1108e18525d5984a
-
SSDEEP
6144:+vFPlgMF6peZUqbWFROY1NiXKvtuTx5qPmOGDe+VNfyhr24L25rQXxSXQMR23M:+9PlgMFgxy2u15emOqVNL4LQriM
Static task
static1
Behavioral task
behavioral1
Sample
0a456f0fee171826bb44c9c2e1d5e7b95c0862b67d9dd75a843dec035224bb74.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Targets
-
-
Target
0a456f0fee171826bb44c9c2e1d5e7b95c0862b67d9dd75a843dec035224bb74.exe
-
Size
355KB
-
MD5
f4fb6b518e2e550467f533124e1f80f4
-
SHA1
964e735dd9410e07536e46b9f50c65fed148bcd7
-
SHA256
0a456f0fee171826bb44c9c2e1d5e7b95c0862b67d9dd75a843dec035224bb74
-
SHA512
4a02aa8aa87dab5d6aa14da695f71aa424b95bc4437c3b8353ac355e0a73f68ded2df49e6e2ca8af6e9389745861a78a7343ab4838a6584a1108e18525d5984a
-
SSDEEP
6144:+vFPlgMF6peZUqbWFROY1NiXKvtuTx5qPmOGDe+VNfyhr24L25rQXxSXQMR23M:+9PlgMFgxy2u15emOqVNL4LQriM
-
Detect Vidar Stealer
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables containing potential Windows Defender anti-emulation checks
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-