General
-
Target
450f025a9a114a4e1b31986fa166633d9395a27189cfd64850d74ba0917ff846
-
Size
771KB
-
Sample
210721-yld8y3nhfs
-
MD5
93fd664b208058a4b113fb52cd8fa640
-
SHA1
8e85d3127654c99a2ae6ddc7b042e7ea1e4e481a
-
SHA256
450f025a9a114a4e1b31986fa166633d9395a27189cfd64850d74ba0917ff846
-
SHA512
a8759a87b506252fd402f12ba11791e1d0c01da9778823acd70e4587ee1b893dd33e09c1280111629845df8188761e26f9a1baa7cbbbab858b21e12af897c866
Static task
static1
Malware Config
Extracted
vidar
39.6
517
https://sslamlssa1.tumblr.com/
-
profile_id
517
Targets
-
-
Target
450f025a9a114a4e1b31986fa166633d9395a27189cfd64850d74ba0917ff846
-
Size
771KB
-
MD5
93fd664b208058a4b113fb52cd8fa640
-
SHA1
8e85d3127654c99a2ae6ddc7b042e7ea1e4e481a
-
SHA256
450f025a9a114a4e1b31986fa166633d9395a27189cfd64850d74ba0917ff846
-
SHA512
a8759a87b506252fd402f12ba11791e1d0c01da9778823acd70e4587ee1b893dd33e09c1280111629845df8188761e26f9a1baa7cbbbab858b21e12af897c866
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-