General
-
Target
12358655f745708b9a29fd19ac08970fab28ae68b7ae9172a461fee772941e27
-
Size
2.0MB
-
Sample
240523-bgt4psfh2y
-
MD5
b744db4b971c328001c4fbaf685a6d71
-
SHA1
b5c0dc4dd8aab8adb6d4d0e17481106ea9f4bfd5
-
SHA256
12358655f745708b9a29fd19ac08970fab28ae68b7ae9172a461fee772941e27
-
SHA512
8b5fcf865cea7e9db845e5b0e494d43114943f160352bcd2b1ee2747c057ea1dcc07a4ff64384a75fa2e194b1fd81a440456b8a4cf8ea12bc50c3215cca4f1d1
-
SSDEEP
49152:7QzHt472DgJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt+tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
12358655f745708b9a29fd19ac08970fab28ae68b7ae9172a461fee772941e27.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
12358655f745708b9a29fd19ac08970fab28ae68b7ae9172a461fee772941e27
-
Size
2.0MB
-
MD5
b744db4b971c328001c4fbaf685a6d71
-
SHA1
b5c0dc4dd8aab8adb6d4d0e17481106ea9f4bfd5
-
SHA256
12358655f745708b9a29fd19ac08970fab28ae68b7ae9172a461fee772941e27
-
SHA512
8b5fcf865cea7e9db845e5b0e494d43114943f160352bcd2b1ee2747c057ea1dcc07a4ff64384a75fa2e194b1fd81a440456b8a4cf8ea12bc50c3215cca4f1d1
-
SSDEEP
49152:7QzHt472DgJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt+tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-