General
-
Target
613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa
-
Size
727KB
-
Sample
211016-a1mnasbfb3
-
MD5
2cbbe36a44658b6641048bfd57e1ea7f
-
SHA1
197d39e7067afe3119a15729d39e6c05df672f05
-
SHA256
613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa
-
SHA512
d61fd507d0d77339c165df0df11365558a408c08e50c1ceac594e93100bba40b4cf672b161cd2f731931b6f8636b4afee0c598f1b8f241f5a33dc8f68ab2b7d5
Static task
static1
Malware Config
Extracted
vidar
41.4
1008
https://mas.to/@sslam
-
profile_id
1008
Targets
-
-
Target
613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa
-
Size
727KB
-
MD5
2cbbe36a44658b6641048bfd57e1ea7f
-
SHA1
197d39e7067afe3119a15729d39e6c05df672f05
-
SHA256
613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa
-
SHA512
d61fd507d0d77339c165df0df11365558a408c08e50c1ceac594e93100bba40b4cf672b161cd2f731931b6f8636b4afee0c598f1b8f241f5a33dc8f68ab2b7d5
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies RDP port number used by Windows
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-