General
-
Target
0e28a5946a07a383712983752bc271ed.bin
-
Size
6.3MB
-
Sample
240616-bc8rassemg
-
MD5
b78d67cc3d5045eabe3fdab5f97c86ec
-
SHA1
b1ea79aeaa3a7ba5286cc8022540456ffe9895b5
-
SHA256
41371734b1408e6c91a150361533c3a653268050c14e5c8f312edd980f5bb0d8
-
SHA512
e8e4749353ec55c4c642c1b60fcf5fcb926f108837624f6c172c843d3613d804b7e1effae0057b2e2a06429e4417c42ac89046a00b0c8dd1b70ca5ca4f50471c
-
SSDEEP
196608:3ztygguQz3bilBcSfnlYlNsRYsTyLBpXP:JygguHBueRXeL/P
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Targets
-
-
Target
Setup.exe
-
Size
670.0MB
-
MD5
87a968fd102e53e6ac4f678213405b56
-
SHA1
057a94d37389e111bf384306d64186c18e9e090d
-
SHA256
df0927eb284b3604c55cbf9ef4b0b2420a5618c555529b6bbda043266732e557
-
SHA512
4036f7719132e68332e3bf6f81dce3c8643e3c83dd8503cdd5897a1fdac36a8d338db7b45e244533687fc982f440d421bafad1d9f1120158df04d65d6f8da3fe
-
SSDEEP
98304:YZL8H6pQ7tD26q13x85KW+y07jEBiacFRutfxgBAXK34iFGCXEd+JebL4MtnaTn:Yy2QpD2VoKW+FjeiBFRo0AXulMxor
-
Detect Vidar Stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-