General
-
Target
633817d281aaf1ba17e026d83d345ab8fdeafde76c7c348cf9d01a5be11070f9
-
Size
2.0MB
-
Sample
240523-dl8trsbh37
-
MD5
83ac22c01333cdd473cf89dfd270acb8
-
SHA1
f33ac592e273a715f1abae1f2f341312f8dc8f5b
-
SHA256
633817d281aaf1ba17e026d83d345ab8fdeafde76c7c348cf9d01a5be11070f9
-
SHA512
9c8748e50763106ae365136dd76c4860641c04ac1ff829aaf2d1d436e61673db8070e554f3271f6192d08597aefc198ae83b2667391ebd24b104bd14ba662068
-
SSDEEP
49152:7QzHt472DQJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt6tIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
633817d281aaf1ba17e026d83d345ab8fdeafde76c7c348cf9d01a5be11070f9.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
633817d281aaf1ba17e026d83d345ab8fdeafde76c7c348cf9d01a5be11070f9
-
Size
2.0MB
-
MD5
83ac22c01333cdd473cf89dfd270acb8
-
SHA1
f33ac592e273a715f1abae1f2f341312f8dc8f5b
-
SHA256
633817d281aaf1ba17e026d83d345ab8fdeafde76c7c348cf9d01a5be11070f9
-
SHA512
9c8748e50763106ae365136dd76c4860641c04ac1ff829aaf2d1d436e61673db8070e554f3271f6192d08597aefc198ae83b2667391ebd24b104bd14ba662068
-
SSDEEP
49152:7QzHt472DQJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHt6tIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-