General
-
Target
40f440760d621c10efdef832ce2160de39b26c13981abec308bb7ddb98cdc2d6
-
Size
603KB
-
Sample
210926-mxejqsefcp
-
MD5
c485999e8f74bb123a624de8c00b5c93
-
SHA1
f899ef657929cd8c29e20312f1ce37c270f24872
-
SHA256
40f440760d621c10efdef832ce2160de39b26c13981abec308bb7ddb98cdc2d6
-
SHA512
53819df59151d31796ba3e861c8937a80d919805a211938238baa9cf436b68e556f4d7d75a6bf0d636220e0f08366b04af5a81380aba3f6c00153073cf09fd52
Static task
static1
Malware Config
Targets
-
-
Target
40f440760d621c10efdef832ce2160de39b26c13981abec308bb7ddb98cdc2d6
-
Size
603KB
-
MD5
c485999e8f74bb123a624de8c00b5c93
-
SHA1
f899ef657929cd8c29e20312f1ce37c270f24872
-
SHA256
40f440760d621c10efdef832ce2160de39b26c13981abec308bb7ddb98cdc2d6
-
SHA512
53819df59151d31796ba3e861c8937a80d919805a211938238baa9cf436b68e556f4d7d75a6bf0d636220e0f08366b04af5a81380aba3f6c00153073cf09fd52
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-