General
-
Target
913ffffe973462ca717e6d6a35435f05.bin
-
Size
2.3MB
-
Sample
240611-dg1mlaselp
-
MD5
85971411b20a7fdb6e90ff268614f53b
-
SHA1
8e7bbd9892f194634d902ba7b5580f530d9f2bcf
-
SHA256
00058eb4fb0f99a87f3b6d186cc4928497aad4d585feb0409c17a93e1e50d839
-
SHA512
ef67e29a5fe0ba5733e44d2c0337632fd9cf1beb64736719b01555e0895329c2ba4adbfe3d4e88d9f7ad543c0a99314accb5ab4256c06fbf5f4ada921f503092
-
SSDEEP
49152:+eCzrb9MTwQxKdKCz2sVL6PZJ4XE4u4mz7wlgh06JkH8QHFU+zJi175jBc:OMvKdhgPZJj4u4mt0YpOG3h5m
Static task
static1
Behavioral task
behavioral1
Sample
d8cbbb545c3b804cd8ac1f861b18852761a987693650478fb01ae98538df9741.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
Targets
-
-
Target
d8cbbb545c3b804cd8ac1f861b18852761a987693650478fb01ae98538df9741.exe
-
Size
2.4MB
-
MD5
913ffffe973462ca717e6d6a35435f05
-
SHA1
f60417a8f4ce340251f855a3c7d1932debddf6e2
-
SHA256
d8cbbb545c3b804cd8ac1f861b18852761a987693650478fb01ae98538df9741
-
SHA512
c044047ff860ee688a6fc5c9e160fccfbf9924e1d00d43c365f2603eaa5ad2d8159e73f20e752b52f569d7716e554d04b8f55cd9ad1775ae0bb62e15a421e1be
-
SSDEEP
49152:Et9lTickDxB5/C22m7GoKwZj3Xtn/gumuRIueEI:kl+cM5/2m7GoKczphZRK
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-