General
-
Target
b9981ecf785c3b53193e41098627de02f8a574126b0d85573b80649f1fae5139
-
Size
744KB
-
Sample
211013-kez2lsdge9
-
MD5
4a86bff40f1c32f2fa2fbd37d8c4c813
-
SHA1
18996d64877b9fd1ec22b64143d74f86d49973ac
-
SHA256
b9981ecf785c3b53193e41098627de02f8a574126b0d85573b80649f1fae5139
-
SHA512
3339cf5bbcf44dc91df8a0de4189a70a309856830944407876cf9658b7f2066769405d44f141429888b8eca09257d4b83fd81ebd9717fbb26b0b438d7676a0fd
Static task
static1
Malware Config
Extracted
vidar
41.3
1008
https://mas.to/@oleg98
-
profile_id
1008
Targets
-
-
Target
b9981ecf785c3b53193e41098627de02f8a574126b0d85573b80649f1fae5139
-
Size
744KB
-
MD5
4a86bff40f1c32f2fa2fbd37d8c4c813
-
SHA1
18996d64877b9fd1ec22b64143d74f86d49973ac
-
SHA256
b9981ecf785c3b53193e41098627de02f8a574126b0d85573b80649f1fae5139
-
SHA512
3339cf5bbcf44dc91df8a0de4189a70a309856830944407876cf9658b7f2066769405d44f141429888b8eca09257d4b83fd81ebd9717fbb26b0b438d7676a0fd
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-