General
-
Target
7d199dc4f90d24b8e3f4f8c23d0e45f89312756e5b8f37d084bc9bd7c3198766
-
Size
671KB
-
Sample
210921-fgs9magbb2
-
MD5
e39b1e0c6e8ef3cd1c3b6743d34c1cb7
-
SHA1
ecdb33f310d676c62a649626ac33b816006dee2c
-
SHA256
7d199dc4f90d24b8e3f4f8c23d0e45f89312756e5b8f37d084bc9bd7c3198766
-
SHA512
8de86ac8c6cc50d52dac2ae061e368d2d1821bfc084df5655983281523fe838bff9c1091980f8c4a33b7c5f634d7c6be0ac7617919be01396d263da05a72191e
Static task
static1
Malware Config
Extracted
vidar
40.8
828
https://pavlovoler.tumblr.com/
-
profile_id
828
Targets
-
-
Target
7d199dc4f90d24b8e3f4f8c23d0e45f89312756e5b8f37d084bc9bd7c3198766
-
Size
671KB
-
MD5
e39b1e0c6e8ef3cd1c3b6743d34c1cb7
-
SHA1
ecdb33f310d676c62a649626ac33b816006dee2c
-
SHA256
7d199dc4f90d24b8e3f4f8c23d0e45f89312756e5b8f37d084bc9bd7c3198766
-
SHA512
8de86ac8c6cc50d52dac2ae061e368d2d1821bfc084df5655983281523fe838bff9c1091980f8c4a33b7c5f634d7c6be0ac7617919be01396d263da05a72191e
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-