General
-
Target
1686f4c3ad60b03cfe3b064ceddbe212ce9e2030aa3126804446bb9d1d8de020
-
Size
2.0MB
-
Sample
240523-ds9dwacb35
-
MD5
59358f6704a41dcee99862134b1a7e8c
-
SHA1
dc9dcd9a410c4c906831221ae35f9e0491942f8e
-
SHA256
1686f4c3ad60b03cfe3b064ceddbe212ce9e2030aa3126804446bb9d1d8de020
-
SHA512
ba5e1ab503013fa1243518a5c801c81a222c8643f490662f33333e33a8bb8ae5feaa13551478ceec28afa7c78fbb61ce6ca8ce1ed6323f3127e0142e4e0dbaa8
-
SSDEEP
49152:7QzHt472DTJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
1686f4c3ad60b03cfe3b064ceddbe212ce9e2030aa3126804446bb9d1d8de020.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
1686f4c3ad60b03cfe3b064ceddbe212ce9e2030aa3126804446bb9d1d8de020
-
Size
2.0MB
-
MD5
59358f6704a41dcee99862134b1a7e8c
-
SHA1
dc9dcd9a410c4c906831221ae35f9e0491942f8e
-
SHA256
1686f4c3ad60b03cfe3b064ceddbe212ce9e2030aa3126804446bb9d1d8de020
-
SHA512
ba5e1ab503013fa1243518a5c801c81a222c8643f490662f33333e33a8bb8ae5feaa13551478ceec28afa7c78fbb61ce6ca8ce1ed6323f3127e0142e4e0dbaa8
-
SSDEEP
49152:7QzHt472DTJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-