General
-
Target
c312320e7d89883844387b9ba9ef9474164accdf9c88e0737dd8e7a2c216b9cb
-
Size
742KB
-
Sample
211015-dqlj2aaec4
-
MD5
0d3f7ba73683f5eb17cd58f440eddf48
-
SHA1
f2e2ebc0a50fbb0aae44ec9d9844e031f62118fc
-
SHA256
c312320e7d89883844387b9ba9ef9474164accdf9c88e0737dd8e7a2c216b9cb
-
SHA512
e703d65c3368b964658c612ef31bbc186556f4b189426430bae31853c46203cbe7ae5bdf89f7fef2571210cdd826ef9e934a33bef81571bea6e99db1ba7fd008
Static task
static1
Malware Config
Extracted
vidar
41.3
1008
https://mas.to/@oleg98
-
profile_id
1008
Targets
-
-
Target
c312320e7d89883844387b9ba9ef9474164accdf9c88e0737dd8e7a2c216b9cb
-
Size
742KB
-
MD5
0d3f7ba73683f5eb17cd58f440eddf48
-
SHA1
f2e2ebc0a50fbb0aae44ec9d9844e031f62118fc
-
SHA256
c312320e7d89883844387b9ba9ef9474164accdf9c88e0737dd8e7a2c216b9cb
-
SHA512
e703d65c3368b964658c612ef31bbc186556f4b189426430bae31853c46203cbe7ae5bdf89f7fef2571210cdd826ef9e934a33bef81571bea6e99db1ba7fd008
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-