General
-
Target
ae52e026e062b307b86a57648a3373daade8d92f3db8f5ca8c7acf5ca23e242e
-
Size
743KB
-
Sample
211013-rvkp7aedd5
-
MD5
aadcc9d44eb95f81457bdefd63ebe811
-
SHA1
c3d9406bdb5ef6f0c0281e78c0b0652906ddcfbc
-
SHA256
ae52e026e062b307b86a57648a3373daade8d92f3db8f5ca8c7acf5ca23e242e
-
SHA512
89cf9689e9321f0d927a9169194ea59e38585354447eab62b8ebe879fd17758c46f63174123d19a5d4335d2a7109686d186b24b1bda91a275100ecbc288245ed
Static task
static1
Malware Config
Extracted
vidar
41.3
1008
https://mas.to/@oleg98
-
profile_id
1008
Targets
-
-
Target
ae52e026e062b307b86a57648a3373daade8d92f3db8f5ca8c7acf5ca23e242e
-
Size
743KB
-
MD5
aadcc9d44eb95f81457bdefd63ebe811
-
SHA1
c3d9406bdb5ef6f0c0281e78c0b0652906ddcfbc
-
SHA256
ae52e026e062b307b86a57648a3373daade8d92f3db8f5ca8c7acf5ca23e242e
-
SHA512
89cf9689e9321f0d927a9169194ea59e38585354447eab62b8ebe879fd17758c46f63174123d19a5d4335d2a7109686d186b24b1bda91a275100ecbc288245ed
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-