General
-
Target
VDeck Setup.exe.vir
-
Size
47.5MB
-
Sample
240803-n6e3assdlj
-
MD5
2a63e2054769d84b26710bc65f378dbb
-
SHA1
8b8eed631cdce7d1b3784d8b27bcea3e1835f4a8
-
SHA256
c2a75fb224674bd4825034ecb647cb1d83f451bf5f3907e4465f7f73d97c6ad8
-
SHA512
e3e6a9d88ab303abd745e5be4bc64f3f0b07c62eac4e408657dbe81fa635ce9e2bea87716edd34fdb32590a21803e865b48740985038503b4e6ff248900e5be8
-
SSDEEP
786432:w05Iws7+lUI4i5PwrRJswginBlsGcuOE3W/4wfpwu94euy8XosV8q23yvjMEgn:w0Xzp4iirRJ1gB+OE3WAq594etE239Tn
Static task
static1
Behavioral task
behavioral1
Sample
VDeck Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VDeck Setup.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
cloregod2
http://45.156.27.196
-
url_path
/4c7ef30d4540070f.php
Targets
-
-
Target
VDeck Setup.exe.vir
-
Size
47.5MB
-
MD5
2a63e2054769d84b26710bc65f378dbb
-
SHA1
8b8eed631cdce7d1b3784d8b27bcea3e1835f4a8
-
SHA256
c2a75fb224674bd4825034ecb647cb1d83f451bf5f3907e4465f7f73d97c6ad8
-
SHA512
e3e6a9d88ab303abd745e5be4bc64f3f0b07c62eac4e408657dbe81fa635ce9e2bea87716edd34fdb32590a21803e865b48740985038503b4e6ff248900e5be8
-
SSDEEP
786432:w05Iws7+lUI4i5PwrRJswginBlsGcuOE3W/4wfpwu94euy8XosV8q23yvjMEgn:w0Xzp4iirRJ1gB+OE3WAq594etE239Tn
-
Detects HijackLoader (aka IDAT Loader)
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2