General
-
Target
9a19ce83735b38329134985a0840e60d4c49f65981a6cb48fc30d7a68608cd43
-
Size
2.0MB
-
Sample
240523-brb1wage77
-
MD5
3a52d37f4e4c3ac752376cfbcc26755d
-
SHA1
b8bb2de877a135c8fb4e50a297e78aefc81939e9
-
SHA256
9a19ce83735b38329134985a0840e60d4c49f65981a6cb48fc30d7a68608cd43
-
SHA512
e8abe45358606273cf82eccd4dfe9f8ef6dfa03b400f15e79db99988fb3f5faed77d228cbf30b3d3855b3ee0f35425d2c089e6fe225cb7d584afbd2deab42aa6
-
SSDEEP
49152:7QzHt472D7JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt9tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
9a19ce83735b38329134985a0840e60d4c49f65981a6cb48fc30d7a68608cd43.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
Targets
-
-
Target
9a19ce83735b38329134985a0840e60d4c49f65981a6cb48fc30d7a68608cd43
-
Size
2.0MB
-
MD5
3a52d37f4e4c3ac752376cfbcc26755d
-
SHA1
b8bb2de877a135c8fb4e50a297e78aefc81939e9
-
SHA256
9a19ce83735b38329134985a0840e60d4c49f65981a6cb48fc30d7a68608cd43
-
SHA512
e8abe45358606273cf82eccd4dfe9f8ef6dfa03b400f15e79db99988fb3f5faed77d228cbf30b3d3855b3ee0f35425d2c089e6fe225cb7d584afbd2deab42aa6
-
SSDEEP
49152:7QzHt472D7JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt9tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-