General
-
Target
94f72fd4417343042fcacd56bd4491f0d638d37388c8d79839c3742c2ebbcaef
-
Size
2.4MB
-
Sample
240610-jjtvqaeg36
-
MD5
82f1a97f6d08a0d16ad9e44d05f724ba
-
SHA1
4ac47621e58f6dfc22500de1c85feccca94cbefe
-
SHA256
94f72fd4417343042fcacd56bd4491f0d638d37388c8d79839c3742c2ebbcaef
-
SHA512
76ec2d51301f3f15a74ce572d10f4e99727d40b6a841195e798987fa17b3ae5604d9fd6fc824f2eef209cc60827ed400deb35c85ca0e408d0c8a4350f31dbdd2
-
SSDEEP
49152:uxFPv/gxRpiyLV1i/DeGjYiw7OWsAKSyue66vrHJk:uV38p9+DeGcFOLzub6vry
Static task
static1
Behavioral task
behavioral1
Sample
94f72fd4417343042fcacd56bd4491f0d638d37388c8d79839c3742c2ebbcaef.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Targets
-
-
Target
94f72fd4417343042fcacd56bd4491f0d638d37388c8d79839c3742c2ebbcaef
-
Size
2.4MB
-
MD5
82f1a97f6d08a0d16ad9e44d05f724ba
-
SHA1
4ac47621e58f6dfc22500de1c85feccca94cbefe
-
SHA256
94f72fd4417343042fcacd56bd4491f0d638d37388c8d79839c3742c2ebbcaef
-
SHA512
76ec2d51301f3f15a74ce572d10f4e99727d40b6a841195e798987fa17b3ae5604d9fd6fc824f2eef209cc60827ed400deb35c85ca0e408d0c8a4350f31dbdd2
-
SSDEEP
49152:uxFPv/gxRpiyLV1i/DeGjYiw7OWsAKSyue66vrHJk:uV38p9+DeGcFOLzub6vry
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-