General
-
Target
Unlock_App_v1.4.zip
-
Size
48.5MB
-
Sample
241217-1brttszkfp
-
MD5
7738962779addcb18be893d7391c773f
-
SHA1
52800ded6d35c8cd08d09275ec6063dc0907e271
-
SHA256
4d4a01682b584c5b9602087b43b0b6bc06e5b1f137dd1207b94e42862877467d
-
SHA512
c6c37df53bce0776680f957b0215bf2609129540ed2d0a9992da9558c0b7da75ecdcd6721dc928cd5f3a82af996d901d11824368dfc9a9689dc369142b677fbe
-
SSDEEP
1572864:ieHpjJ0gJDfbz+jlxanXJTOkCNRa34d4r:ieD0gtWranXpgnfd6
Static task
static1
Behavioral task
behavioral1
Sample
Unlock_App_v1.4.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Password.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Unlock_App_v1.4.rar
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Unlock_App_v1.4.zip
-
Size
48.5MB
-
MD5
7738962779addcb18be893d7391c773f
-
SHA1
52800ded6d35c8cd08d09275ec6063dc0907e271
-
SHA256
4d4a01682b584c5b9602087b43b0b6bc06e5b1f137dd1207b94e42862877467d
-
SHA512
c6c37df53bce0776680f957b0215bf2609129540ed2d0a9992da9558c0b7da75ecdcd6721dc928cd5f3a82af996d901d11824368dfc9a9689dc369142b677fbe
-
SSDEEP
1572864:ieHpjJ0gJDfbz+jlxanXJTOkCNRa34d4r:ieD0gtWranXpgnfd6
-
Detect Vidar Stealer
-
Vidar family
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
-
-
Target
Password.txt
-
Size
95B
-
MD5
088aba59e0174b987e54d6f6504564c9
-
SHA1
bbaccffe216ea7e9feeaa2f056e2cda05088d29f
-
SHA256
c9f3656be4b0f13024b0cf0b7efbc70e5c8a8c63c11bf435ae5ad7d56d09176d
-
SHA512
9d4f72d63acdd502ca9cc9da4148a1ca77b42a3693e2c06dc8b4e1cc610a1d60a17b92db5fd9a1cab982105fb1ccef92430c332fc6f607c95a256d9a5574e01c
Score1/10 -
-
-
Target
Unlock_App_v1.4.rar
-
Size
48.5MB
-
MD5
1188b089c5d39b9f9b1acbf22f8cd9f2
-
SHA1
048ec6ba611e1369a0919e5ac96ae6234b8c4796
-
SHA256
759d9653d595c7f8de4c55d22ce266c809aaa4c06e35a3590ccd9aaa97177cdd
-
SHA512
f8ac0ed5953fdf09856ef6d1e9bf852d2c0f395cb89a09d3d5472c6efc54e4315e8ef5d3d958a14879d451b42f9104eb590ab9f44dc7a063a08abc1d4fc6a6d9
-
SSDEEP
1572864:4eHpjJ0gJDfbz+jlxanXJTOkCNRa34d4A:4eD0gtWranXpgnfdj
Score1/10 -