General
-
Target
afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2
-
Size
771KB
-
Sample
210721-k9cr7ls6as
-
MD5
d3cdef653cb51e6f86d094b18c7b09d2
-
SHA1
3f53563da7fb1c2cbd3cc918859c8285c4399c27
-
SHA256
afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2
-
SHA512
105cd18e20473256dd3161b4ed1ef3d2ef76d03050783bb052810501a2642319af8b9f264ab0dccde15b06196138dd50a713d26afdd4c2667475d9a518b7dc74
Static task
static1
Malware Config
Extracted
vidar
39.6
517
https://sslamlssa1.tumblr.com/
-
profile_id
517
Targets
-
-
Target
afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2
-
Size
771KB
-
MD5
d3cdef653cb51e6f86d094b18c7b09d2
-
SHA1
3f53563da7fb1c2cbd3cc918859c8285c4399c27
-
SHA256
afe2301709a95067f236b209d744b16a7f51b4c6e7f00ecde446212a885e8cb2
-
SHA512
105cd18e20473256dd3161b4ed1ef3d2ef76d03050783bb052810501a2642319af8b9f264ab0dccde15b06196138dd50a713d26afdd4c2667475d9a518b7dc74
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-