General
-
Target
ab84f8131f507e2ced9d2e3d7826e5b90ce9c939a44042f8adea37bf4734f996
-
Size
3.6MB
-
Sample
210516-7v1lmsxtfa
-
MD5
3906b7977437ba0d985277e8e6354e83
-
SHA1
7e26f58ad5d912f7b548840cce75ece0d7616311
-
SHA256
ab84f8131f507e2ced9d2e3d7826e5b90ce9c939a44042f8adea37bf4734f996
-
SHA512
8bf3a5222881f1fef271e8240f1a53de01f694e7656b9857955aadae425ab6272a5952f0e98119fccab8df142830b2afa18acbc212ced00fab089bc55e516875
Static task
static1
Behavioral task
behavioral1
Sample
ab84f8131f507e2ced9d2e3d7826e5b90ce9c939a44042f8adea37bf4734f996.exe
Resource
win7v20210408
Malware Config
Extracted
vidar
9.3
231
https://photoshopsarte.com
-
profile_id
231
Targets
-
-
Target
ab84f8131f507e2ced9d2e3d7826e5b90ce9c939a44042f8adea37bf4734f996
-
Size
3.6MB
-
MD5
3906b7977437ba0d985277e8e6354e83
-
SHA1
7e26f58ad5d912f7b548840cce75ece0d7616311
-
SHA256
ab84f8131f507e2ced9d2e3d7826e5b90ce9c939a44042f8adea37bf4734f996
-
SHA512
8bf3a5222881f1fef271e8240f1a53de01f694e7656b9857955aadae425ab6272a5952f0e98119fccab8df142830b2afa18acbc212ced00fab089bc55e516875
-
Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-