General
-
Target
ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86
-
Size
577KB
-
Sample
210923-phyeeaedh2
-
MD5
9fcf0f5b99f398b9e6b6afaa25c60917
-
SHA1
720faa2bf8de76f8e92161b792f0a99eeeb63883
-
SHA256
ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86
-
SHA512
e9995cd9c5c3f694a9eb895de2840cdaecfd29681f2ca1616f9860fa2aabbbfdc1e678a3e54b69215c4ab6fdea8235a70773aa63d9e17d1c11647ae872bbb534
Static task
static1
Malware Config
Extracted
vidar
41
1008
https://mas.to/@killern0
-
profile_id
1008
Targets
-
-
Target
ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86
-
Size
577KB
-
MD5
9fcf0f5b99f398b9e6b6afaa25c60917
-
SHA1
720faa2bf8de76f8e92161b792f0a99eeeb63883
-
SHA256
ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86
-
SHA512
e9995cd9c5c3f694a9eb895de2840cdaecfd29681f2ca1616f9860fa2aabbbfdc1e678a3e54b69215c4ab6fdea8235a70773aa63d9e17d1c11647ae872bbb534
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-