General
-
Target
@^NewFile_PCSetup_77665_ṔḁṨṨẄṏṛḒ_^$.zip
-
Size
8.0MB
-
Sample
240616-v5yxcavaqn
-
MD5
b6abd24f1488d6e9f9bdc6375f1a7ba9
-
SHA1
f59a652de28270e53e147fce2fbe8865a391d995
-
SHA256
a2b34479327477c185736f3d540ab29f6a4d1b9f3b66109e4e706760daec5b61
-
SHA512
00b309dc034760963548073b203a54900e216adf97c7eaf47caca697a9d97bebc84fcee8c34f0ab1de2747ec7a444b9767cbc402b59514a8514f79f7b25df1b1
-
SSDEEP
196608:DSMeeQNfc7a24+hj2in9DqwqN81oTKRgrO//p:jkJu1z9ewqNoCKyqJ
Static task
static1
Behavioral task
behavioral1
Sample
@^NewFile_PCSetup_77665_????????_^$/Setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
@^NewFile_PCSetup_77665_????????_^$/Setup.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
Targets
-
-
Target
@^NewFile_PCSetup_77665_????????_^$/Setup.exe
-
Size
670.0MB
-
MD5
87a968fd102e53e6ac4f678213405b56
-
SHA1
057a94d37389e111bf384306d64186c18e9e090d
-
SHA256
df0927eb284b3604c55cbf9ef4b0b2420a5618c555529b6bbda043266732e557
-
SHA512
4036f7719132e68332e3bf6f81dce3c8643e3c83dd8503cdd5897a1fdac36a8d338db7b45e244533687fc982f440d421bafad1d9f1120158df04d65d6f8da3fe
-
SSDEEP
98304:YZL8H6pQ7tD26q13x85KW+y07jEBiacFRutfxgBAXK34iFGCXEd+JebL4MtnaTn:Yy2QpD2VoKW+FjeiBFRo0AXulMxor
-
Detect Vidar Stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-