General
-
Target
##!!SetUp_5566_Pa$sW0rd$$!!.zip
-
Size
14.0MB
-
Sample
240614-tjbn9axerb
-
MD5
c5beb2107b1c858ace78ea6ce60ba131
-
SHA1
7d9fab73d76f00933107d8dc680aa6d1de053538
-
SHA256
25cbba8cb4b96c8b9e6c8490c2460eb8fecb3b6dd4eb8fc2a06392cb018dda5b
-
SHA512
307604092c9574fcaaf134def38e815de50d48835c5167086fdab5963a6e195633bcb59b667f102f02be01192984a975a2691897c3bbc2be855d036c5a7b1e47
-
SSDEEP
393216:qzEczUdMmVDBOxcEE/S17dGzzSlnsmLbIzNkqo6Wu+9Tq:qgczU2mVDEy7egzzSlnsSICU7Mq
Static task
static1
Behavioral task
behavioral1
Sample
##!!SetUp_5566_Pa$sW0rd$$!!/Setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
##!!SetUp_5566_Pa$sW0rd$$!!/Setup.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
##!!SetUp_5566_Pa$sW0rd$$!!/Setup.exe
-
Size
5.4MB
-
MD5
ad2735f096925010a53450cb4178c89e
-
SHA1
c6d65163c6315a642664f4eaec0fae9528549bfe
-
SHA256
4e775b5fafb4e6d89a4694f8694d2b8b540534bd4a52ff42f70095f1c929160e
-
SHA512
1868b22a7c5cba89545b06f010c09c5418b3d86039099d681eee9567c47208fdba3b89c6251cf03c964c58c805280d45ba9c3533125f6bd3e0bc067477e03ab9
-
SSDEEP
98304:o/zx+riUDpJowboU+XEsumY2XW6jBYeZ1ER:2x+riUDwUj12X1tY5
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-