General
-
Target
d4e89e6e74d76a4438e6d81f425a1d12c2de3577a1173a0504b1b988aef51d8f
-
Size
728KB
-
Sample
211015-w5p5wabcc5
-
MD5
4379eeec5ef4e489cc9f2ac5e5fd6e89
-
SHA1
4a2f283e40f8fd1db7758f44626422e4acfcfaed
-
SHA256
d4e89e6e74d76a4438e6d81f425a1d12c2de3577a1173a0504b1b988aef51d8f
-
SHA512
8e8a0edee55c7d665e6af10799ae539d3cdc81e03d34d1853ec616d9746004f21de2fdab5d3602535bf856e40c88ffadd1a780bdd8eea17cc08c8a23510c453b
Static task
static1
Malware Config
Extracted
vidar
41.4
1008
https://mas.to/@sslam
-
profile_id
1008
Targets
-
-
Target
d4e89e6e74d76a4438e6d81f425a1d12c2de3577a1173a0504b1b988aef51d8f
-
Size
728KB
-
MD5
4379eeec5ef4e489cc9f2ac5e5fd6e89
-
SHA1
4a2f283e40f8fd1db7758f44626422e4acfcfaed
-
SHA256
d4e89e6e74d76a4438e6d81f425a1d12c2de3577a1173a0504b1b988aef51d8f
-
SHA512
8e8a0edee55c7d665e6af10799ae539d3cdc81e03d34d1853ec616d9746004f21de2fdab5d3602535bf856e40c88ffadd1a780bdd8eea17cc08c8a23510c453b
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-