General
-
Target
5c7f944037fe401cf46f5e76ae1c701c13cadffec193d8278edace6a31b3f0fe
-
Size
2.0MB
-
Sample
240523-c3j2asag8z
-
MD5
da9593a786009f93cc9372d5b590bf6d
-
SHA1
7a019d10db561cbc863e79f8b8f0139c1420ba1a
-
SHA256
5c7f944037fe401cf46f5e76ae1c701c13cadffec193d8278edace6a31b3f0fe
-
SHA512
aa2fe2213f8010a3515f26008d87338968f27c79ec44735fa2960ec8236ab0485bd656a6e097ad20b957ae140801eb8314fb9fdbcdebcd8497a2135e313ad846
-
SSDEEP
49152:7QzHt472DCJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtktIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
5c7f944037fe401cf46f5e76ae1c701c13cadffec193d8278edace6a31b3f0fe.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
5c7f944037fe401cf46f5e76ae1c701c13cadffec193d8278edace6a31b3f0fe
-
Size
2.0MB
-
MD5
da9593a786009f93cc9372d5b590bf6d
-
SHA1
7a019d10db561cbc863e79f8b8f0139c1420ba1a
-
SHA256
5c7f944037fe401cf46f5e76ae1c701c13cadffec193d8278edace6a31b3f0fe
-
SHA512
aa2fe2213f8010a3515f26008d87338968f27c79ec44735fa2960ec8236ab0485bd656a6e097ad20b957ae140801eb8314fb9fdbcdebcd8497a2135e313ad846
-
SSDEEP
49152:7QzHt472DCJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtktIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-