General
-
Target
04a4c939069d40961567895f539aa5f2b6d8e98a1095f6a17a45aafa1613de35
-
Size
2.0MB
-
Sample
240523-bxrzaagh74
-
MD5
cc63b9c7489d07e6d4fd5074accd510c
-
SHA1
d56cd93a4f4c181ad057693a77ad86fd7d41fcf1
-
SHA256
04a4c939069d40961567895f539aa5f2b6d8e98a1095f6a17a45aafa1613de35
-
SHA512
2dc3b9a470d822b7e607b07c8a7ec93a73230a77cbeb8cf485bc2b3042c7afd6ea3c10b85adc8803e339cd0d45cd63a76576bb47f01edc624f3a2d3fb17b14ac
-
SSDEEP
49152:7QzHt472DxJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtTtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
04a4c939069d40961567895f539aa5f2b6d8e98a1095f6a17a45aafa1613de35.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
04a4c939069d40961567895f539aa5f2b6d8e98a1095f6a17a45aafa1613de35
-
Size
2.0MB
-
MD5
cc63b9c7489d07e6d4fd5074accd510c
-
SHA1
d56cd93a4f4c181ad057693a77ad86fd7d41fcf1
-
SHA256
04a4c939069d40961567895f539aa5f2b6d8e98a1095f6a17a45aafa1613de35
-
SHA512
2dc3b9a470d822b7e607b07c8a7ec93a73230a77cbeb8cf485bc2b3042c7afd6ea3c10b85adc8803e339cd0d45cd63a76576bb47f01edc624f3a2d3fb17b14ac
-
SSDEEP
49152:7QzHt472DxJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtTtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-