General
-
Target
VDeck Setup.exe
-
Size
42.9MB
-
Sample
240804-ce8dzsxdnf
-
MD5
aa53626f27f7c2d0428d81f5f3ec02ac
-
SHA1
52dac85b5d3e0491bb05c7dd6d88842409b4e0ff
-
SHA256
8aad43ed10153b766f0c7077748cbabf4bfe98b62ca6fe1ad6a5a0840f4b7bb2
-
SHA512
46b57df175879e4879da462cd25fdd8c6e4be800cc9cdae22b6a5452b0755418c69629c793324e1dd799d02972f23065591552e02401499a43bef376ab7c4fd8
-
SSDEEP
786432:NKiex8/gquJ58B+PEy+Si2csY2rBWHTFvtlVCJd69mVPo7FmzYV5zy397k8/2mEt:NVy8/gN5WNlSuKKjlVCn69mVT85mBz/Y
Static task
static1
Behavioral task
behavioral1
Sample
VDeck Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VDeck Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
VDeck Setup.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
vor2
http://45.152.112.103
-
url_path
/1cf3aa1810feeb67.php
Targets
-
-
Target
VDeck Setup.exe
-
Size
42.9MB
-
MD5
aa53626f27f7c2d0428d81f5f3ec02ac
-
SHA1
52dac85b5d3e0491bb05c7dd6d88842409b4e0ff
-
SHA256
8aad43ed10153b766f0c7077748cbabf4bfe98b62ca6fe1ad6a5a0840f4b7bb2
-
SHA512
46b57df175879e4879da462cd25fdd8c6e4be800cc9cdae22b6a5452b0755418c69629c793324e1dd799d02972f23065591552e02401499a43bef376ab7c4fd8
-
SSDEEP
786432:NKiex8/gquJ58B+PEy+Si2csY2rBWHTFvtlVCJd69mVPo7FmzYV5zy397k8/2mEt:NVy8/gN5WNlSuKKjlVCn69mVT85mBz/Y
-
Detects HijackLoader (aka IDAT Loader)
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2