General
-
Target
46da8b8f899d407ab4d94c574977e3ce43abf60273d3166754d1674d3fcdc34e
-
Size
2.0MB
-
Sample
240523-edqhwsda74
-
MD5
ef2944a04ca23032363533191f650981
-
SHA1
b9e49aa37a0a6eb2a388903364c1b4df9aad5e2f
-
SHA256
46da8b8f899d407ab4d94c574977e3ce43abf60273d3166754d1674d3fcdc34e
-
SHA512
67da4a9f62d4f738c4a74e39e31d7f326ec7fae07d346eeed79cc71e28b0f12a5d98af3ec050d47941ae3f0dbfd308d876673447ca12c610f57ff09d89317dae
-
SSDEEP
49152:7QzHt472D7JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtJtIuoITsdZ
Static task
static1
Behavioral task
behavioral1
Sample
46da8b8f899d407ab4d94c574977e3ce43abf60273d3166754d1674d3fcdc34e.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
46da8b8f899d407ab4d94c574977e3ce43abf60273d3166754d1674d3fcdc34e
-
Size
2.0MB
-
MD5
ef2944a04ca23032363533191f650981
-
SHA1
b9e49aa37a0a6eb2a388903364c1b4df9aad5e2f
-
SHA256
46da8b8f899d407ab4d94c574977e3ce43abf60273d3166754d1674d3fcdc34e
-
SHA512
67da4a9f62d4f738c4a74e39e31d7f326ec7fae07d346eeed79cc71e28b0f12a5d98af3ec050d47941ae3f0dbfd308d876673447ca12c610f57ff09d89317dae
-
SSDEEP
49152:7QzHt472D7JtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtJtIuoITsdZ
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-