General
-
Target
c72f4c14a8a21882a03da48f0395808b78c500a9a53ed5a6e9cce83152553bcf
-
Size
683KB
-
Sample
211012-2mzjgsdcg7
-
MD5
444fffaed54e4b26f8adbf7a3b45bcc7
-
SHA1
225ed58da513caebd56b339afb7d3893059c461e
-
SHA256
c72f4c14a8a21882a03da48f0395808b78c500a9a53ed5a6e9cce83152553bcf
-
SHA512
ca3aeeb02f660cd99354f58e5979c6195d35062d01318ce2411c684e338212cc39b13ba318cf05bfe4f38ce60a627c7033f2480a709e8548e687b4c3c0aa569a
Static task
static1
Malware Config
Extracted
vidar
41.3
1008
https://mas.to/@oleg98
-
profile_id
1008
Targets
-
-
Target
c72f4c14a8a21882a03da48f0395808b78c500a9a53ed5a6e9cce83152553bcf
-
Size
683KB
-
MD5
444fffaed54e4b26f8adbf7a3b45bcc7
-
SHA1
225ed58da513caebd56b339afb7d3893059c461e
-
SHA256
c72f4c14a8a21882a03da48f0395808b78c500a9a53ed5a6e9cce83152553bcf
-
SHA512
ca3aeeb02f660cd99354f58e5979c6195d35062d01318ce2411c684e338212cc39b13ba318cf05bfe4f38ce60a627c7033f2480a709e8548e687b4c3c0aa569a
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-