General
-
Target
rgVakr0EruC2FtauFmrgXkxw.exe
-
Size
610KB
-
Sample
210823-8aat3l9s82
-
MD5
592404767648b0afc3cab6fade2fb7d2
-
SHA1
bab615526528b498a09d76decbf86691807e7822
-
SHA256
3593247c384586966e5a0e28eb4c4174b31e93c78c7a9e8fef96ec42a152e509
-
SHA512
83819e4956ac6da21c4927fa6edee2b178bc89bcda8fb5f4d0767d0d8310393f50f0f7e76e1a963002626a8176abfa8d864c9229a41e5b61e1a24a32d379dda9
Static task
static1
Behavioral task
behavioral1
Sample
rgVakr0EruC2FtauFmrgXkxw.exe
Resource
win7v20210410
Malware Config
Extracted
vidar
40.1
937
https://eduarroma.tumblr.com/
-
profile_id
937
Targets
-
-
Target
rgVakr0EruC2FtauFmrgXkxw.exe
-
Size
610KB
-
MD5
592404767648b0afc3cab6fade2fb7d2
-
SHA1
bab615526528b498a09d76decbf86691807e7822
-
SHA256
3593247c384586966e5a0e28eb4c4174b31e93c78c7a9e8fef96ec42a152e509
-
SHA512
83819e4956ac6da21c4927fa6edee2b178bc89bcda8fb5f4d0767d0d8310393f50f0f7e76e1a963002626a8176abfa8d864c9229a41e5b61e1a24a32d379dda9
-
Vidar Stealer
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-