General
-
Target
b8620f16ff427e2e2d9bbb0d28028540f07b8af2697793d69b765371170643f3
-
Size
2.0MB
-
Sample
240523-cchesahf98
-
MD5
fbc3cdaa5ce85fda0c06adbde11b833a
-
SHA1
9b4517ae005f8df4736a2e4306e43db2e7939e20
-
SHA256
b8620f16ff427e2e2d9bbb0d28028540f07b8af2697793d69b765371170643f3
-
SHA512
12ee1647d391e5ffb67c1ceee128d26f1700ee3966795a5d351f5f7c85e0a98749abf7abe2b73dfdae66e2586140c5dbc9f6e3a2326a622fddf50fd0c2607b3c
-
SSDEEP
49152:7QzHt472DTJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtltIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
b8620f16ff427e2e2d9bbb0d28028540f07b8af2697793d69b765371170643f3.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
b8620f16ff427e2e2d9bbb0d28028540f07b8af2697793d69b765371170643f3
-
Size
2.0MB
-
MD5
fbc3cdaa5ce85fda0c06adbde11b833a
-
SHA1
9b4517ae005f8df4736a2e4306e43db2e7939e20
-
SHA256
b8620f16ff427e2e2d9bbb0d28028540f07b8af2697793d69b765371170643f3
-
SHA512
12ee1647d391e5ffb67c1ceee128d26f1700ee3966795a5d351f5f7c85e0a98749abf7abe2b73dfdae66e2586140c5dbc9f6e3a2326a622fddf50fd0c2607b3c
-
SSDEEP
49152:7QzHt472DTJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtltIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-