General
-
Target
ac23fe5fd95f80c6c015a8fc21fcad049ebdf8b2ab349f887152a4bb9367d70d
-
Size
730KB
-
Sample
210722-bsepp7jxnn
-
MD5
8d56630b7e3479e10681ef2db1bf4fdd
-
SHA1
1619fc78816e2c02af1e82541a592899a7b78ee8
-
SHA256
ac23fe5fd95f80c6c015a8fc21fcad049ebdf8b2ab349f887152a4bb9367d70d
-
SHA512
a23d54d76c5e5c14326096142bf62b4a39646d672128aacab99fe8a8bd3f2e537a0f8bb72318f806db36c756f49e1ad5683425394c42180b308331103cdd191b
Static task
static1
Malware Config
Extracted
vidar
39.6
517
https://sslamlssa1.tumblr.com/
-
profile_id
517
Targets
-
-
Target
ac23fe5fd95f80c6c015a8fc21fcad049ebdf8b2ab349f887152a4bb9367d70d
-
Size
730KB
-
MD5
8d56630b7e3479e10681ef2db1bf4fdd
-
SHA1
1619fc78816e2c02af1e82541a592899a7b78ee8
-
SHA256
ac23fe5fd95f80c6c015a8fc21fcad049ebdf8b2ab349f887152a4bb9367d70d
-
SHA512
a23d54d76c5e5c14326096142bf62b4a39646d672128aacab99fe8a8bd3f2e537a0f8bb72318f806db36c756f49e1ad5683425394c42180b308331103cdd191b
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-