General
-
Target
1746483f6aaa4a16499d03b654bcf1c20f32805a407680016a7c4df3d9f81ec2
-
Size
681KB
-
Sample
211013-25r75afdb2
-
MD5
cc745be36b0d3e8e319924eaf296f197
-
SHA1
4bbff6a72f2574eb749d5a49753f68ccda45abb4
-
SHA256
1746483f6aaa4a16499d03b654bcf1c20f32805a407680016a7c4df3d9f81ec2
-
SHA512
5e6614b02aa7097b596fc06d4eb0a6a7e926c47ca6282dbe7917bc0c8882f969f08715043e2d8db1edc0be87e97178019999e5d369751fa23e2b15985d96072c
Static task
static1
Malware Config
Extracted
vidar
41.3
903
https://mas.to/@oleg98
-
profile_id
903
Targets
-
-
Target
1746483f6aaa4a16499d03b654bcf1c20f32805a407680016a7c4df3d9f81ec2
-
Size
681KB
-
MD5
cc745be36b0d3e8e319924eaf296f197
-
SHA1
4bbff6a72f2574eb749d5a49753f68ccda45abb4
-
SHA256
1746483f6aaa4a16499d03b654bcf1c20f32805a407680016a7c4df3d9f81ec2
-
SHA512
5e6614b02aa7097b596fc06d4eb0a6a7e926c47ca6282dbe7917bc0c8882f969f08715043e2d8db1edc0be87e97178019999e5d369751fa23e2b15985d96072c
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-