General
-
Target
b6b334165e7e8327766b33cdfcb9a0c48ea4872c1186732ecf048ca5bb80f62a
-
Size
2.0MB
-
Sample
240523-cmgagaaa6w
-
MD5
6217796f6f79ddc7810bf8e4ca36f5f1
-
SHA1
4bae5ef53e6812994051fa0aa68d799ceab9b237
-
SHA256
b6b334165e7e8327766b33cdfcb9a0c48ea4872c1186732ecf048ca5bb80f62a
-
SHA512
013204d6b46a4e810b39222c9d50a14ad831071d3decb2b4881f9bf89346916929a6fabf17854313019a3e0d3c17e4ec6171668d855ebbf80f6d8673cafed108
-
SSDEEP
49152:7QzHt472DDJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtJtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
b6b334165e7e8327766b33cdfcb9a0c48ea4872c1186732ecf048ca5bb80f62a.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
Targets
-
-
Target
b6b334165e7e8327766b33cdfcb9a0c48ea4872c1186732ecf048ca5bb80f62a
-
Size
2.0MB
-
MD5
6217796f6f79ddc7810bf8e4ca36f5f1
-
SHA1
4bae5ef53e6812994051fa0aa68d799ceab9b237
-
SHA256
b6b334165e7e8327766b33cdfcb9a0c48ea4872c1186732ecf048ca5bb80f62a
-
SHA512
013204d6b46a4e810b39222c9d50a14ad831071d3decb2b4881f9bf89346916929a6fabf17854313019a3e0d3c17e4ec6171668d855ebbf80f6d8673cafed108
-
SSDEEP
49152:7QzHt472DDJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtJtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-