General
-
Target
916afbce3874be9765a7c1e31f88126ce12c33f51b6a9510b22aa2c874437e55
-
Size
724KB
-
Sample
211015-nta8ksaha4
-
MD5
8ca775a197c08aaec6df295af8de3fc3
-
SHA1
306a9b1808c62fa37246c705263e1984f772d4fc
-
SHA256
916afbce3874be9765a7c1e31f88126ce12c33f51b6a9510b22aa2c874437e55
-
SHA512
b10f5b08bb7e51db6b92e18d2eeb9260ec7a666f64dedccd3395f011369c8d775b6f1135b719e1a0fd70cb3207cb2212919db262086ac86fc367a90fa52f55e2
Static task
static1
Malware Config
Extracted
vidar
41.3
1008
https://mas.to/@oleg98
-
profile_id
1008
Targets
-
-
Target
916afbce3874be9765a7c1e31f88126ce12c33f51b6a9510b22aa2c874437e55
-
Size
724KB
-
MD5
8ca775a197c08aaec6df295af8de3fc3
-
SHA1
306a9b1808c62fa37246c705263e1984f772d4fc
-
SHA256
916afbce3874be9765a7c1e31f88126ce12c33f51b6a9510b22aa2c874437e55
-
SHA512
b10f5b08bb7e51db6b92e18d2eeb9260ec7a666f64dedccd3395f011369c8d775b6f1135b719e1a0fd70cb3207cb2212919db262086ac86fc367a90fa52f55e2
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Matrix
Collection
Data from Local System
3Command and Control
Credential Access
Credentials in Files
3Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation