General
-
Target
bf9c5485858e0daa4e452c284925c29b653eeadf5d3bf698b6c3fc8b60c57bec
-
Size
737KB
-
Sample
210722-jnjzz83afs
-
MD5
65c209fc75941beec66b81a7df5e55a4
-
SHA1
019bad17f1ab89155c2808fb35e577954933a006
-
SHA256
bf9c5485858e0daa4e452c284925c29b653eeadf5d3bf698b6c3fc8b60c57bec
-
SHA512
93f4660ab54d3db0f98c65abd11784e86ca4b1f94c2cae681370f0c1d57eb0755eb7b8189d0ded7c5832187496c60d4eae8fe917c766f221976312bb864551ed
Static task
static1
Malware Config
Extracted
vidar
39.6
517
https://sslamlssa1.tumblr.com/
-
profile_id
517
Targets
-
-
Target
bf9c5485858e0daa4e452c284925c29b653eeadf5d3bf698b6c3fc8b60c57bec
-
Size
737KB
-
MD5
65c209fc75941beec66b81a7df5e55a4
-
SHA1
019bad17f1ab89155c2808fb35e577954933a006
-
SHA256
bf9c5485858e0daa4e452c284925c29b653eeadf5d3bf698b6c3fc8b60c57bec
-
SHA512
93f4660ab54d3db0f98c65abd11784e86ca4b1f94c2cae681370f0c1d57eb0755eb7b8189d0ded7c5832187496c60d4eae8fe917c766f221976312bb864551ed
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-