General
-
Target
3a0daf8770924f4f9f75a66faf1237e239c83fc96d9c87b1b0dd051ddd612a78
-
Size
9.3MB
-
Sample
240604-glnqdafc6v
-
MD5
9f57284f2753c9f00992278506782f9e
-
SHA1
d2fa6096a2c792ed86e369aa2d580934306569b7
-
SHA256
3a0daf8770924f4f9f75a66faf1237e239c83fc96d9c87b1b0dd051ddd612a78
-
SHA512
e8fbe2e18f5e6896346f07c9225596f7b2d828025f648dd78f8a53d73327e94e9a41a9c815494f94973eb03b6a378429b6686de01ff7131788d360f4ba55d9ca
-
SSDEEP
196608:R4MSWTcvzuKGGFqnGX//meyDoylj218IdfGgL1ELhvqCfMP:CWTcvKnGFqKWeyDoylWbxVELAUMP
Static task
static1
Behavioral task
behavioral1
Sample
46514a81626d3c58a48f0bdd17c9bdb2352004ae4ab79af1ca50ff285bcb68cb.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
46514a81626d3c58a48f0bdd17c9bdb2352004ae4ab79af1ca50ff285bcb68cb.exe
-
Size
9.9MB
-
MD5
711e1fcfc587eee41a187abd9091bfea
-
SHA1
cb1e234580935af2f597d9e667f8d2599368abe3
-
SHA256
46514a81626d3c58a48f0bdd17c9bdb2352004ae4ab79af1ca50ff285bcb68cb
-
SHA512
bb0f540acf5e0e9f5044e3c2868f8aec88199ae5e9007a6df2a904a60b33079cd4d94e66ff195b898c6fe0d91075fb77a789a5e64769b6b4cba81232dc91fdb5
-
SSDEEP
196608:tYohctfEFaaf+vApItM1rf/c3y+OykakmBaREv12zsE1EyamEVgwNzYtdeu8T:tYictfEFv+vHC1b/cXcyGE92h1om3oYS
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-