General
-
Target
5ab8c35b9e4d8ec58a8f6a2f5383042a.exe
-
Size
2.4MB
-
Sample
240609-tejt3ach42
-
MD5
5ab8c35b9e4d8ec58a8f6a2f5383042a
-
SHA1
7a1d15fb3b9aff903d7c945c9f2b76e8b538e26a
-
SHA256
4f442d5f511fe820b75a49169785dac48fce1a19285372b47c5e4ab62209df1a
-
SHA512
598f024bcf11686c5aaeda6d56a7a4f67447ea7a82e8cc535c94c229ffba88d7ab2c879ce114f4647389e76890be34e1353a4a43f58a16427fc0bff8eae5b261
-
SSDEEP
49152:MgMB1gmd/0wYxmj02wfNQJGSLrp9+Wlbz1jiAkBAbdUHrU:i1bWJfNqG4nZxji/BAbdS
Static task
static1
Behavioral task
behavioral1
Sample
5ab8c35b9e4d8ec58a8f6a2f5383042a.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Targets
-
-
Target
5ab8c35b9e4d8ec58a8f6a2f5383042a.exe
-
Size
2.4MB
-
MD5
5ab8c35b9e4d8ec58a8f6a2f5383042a
-
SHA1
7a1d15fb3b9aff903d7c945c9f2b76e8b538e26a
-
SHA256
4f442d5f511fe820b75a49169785dac48fce1a19285372b47c5e4ab62209df1a
-
SHA512
598f024bcf11686c5aaeda6d56a7a4f67447ea7a82e8cc535c94c229ffba88d7ab2c879ce114f4647389e76890be34e1353a4a43f58a16427fc0bff8eae5b261
-
SSDEEP
49152:MgMB1gmd/0wYxmj02wfNQJGSLrp9+Wlbz1jiAkBAbdUHrU:i1bWJfNqG4nZxji/BAbdS
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-