General
-
Target
46283c3ce66d2193ebefe976a00ecf4bfc129cc45a0737689cde66d4f696bb43
-
Size
771KB
-
Sample
210721-yvaztbzyaj
-
MD5
ba51cc2ab8c0102587bf9d7932676b21
-
SHA1
6eb2c22441680b99b6b6d9c03f4269c3eb1e8dd5
-
SHA256
46283c3ce66d2193ebefe976a00ecf4bfc129cc45a0737689cde66d4f696bb43
-
SHA512
1da6923bd7d1a76efd23d0e0a3b7bf1324ee7d6eaeaa89c6b6a49ccc1c8fda755c04da0d70f1bd787098ce283c26b0d4b28d40f7df829ff73742a10e4412569e
Static task
static1
Malware Config
Extracted
vidar
39.6
517
https://sslamlssa1.tumblr.com/
-
profile_id
517
Targets
-
-
Target
46283c3ce66d2193ebefe976a00ecf4bfc129cc45a0737689cde66d4f696bb43
-
Size
771KB
-
MD5
ba51cc2ab8c0102587bf9d7932676b21
-
SHA1
6eb2c22441680b99b6b6d9c03f4269c3eb1e8dd5
-
SHA256
46283c3ce66d2193ebefe976a00ecf4bfc129cc45a0737689cde66d4f696bb43
-
SHA512
1da6923bd7d1a76efd23d0e0a3b7bf1324ee7d6eaeaa89c6b6a49ccc1c8fda755c04da0d70f1bd787098ce283c26b0d4b28d40f7df829ff73742a10e4412569e
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-