General
-
Target
b319d247d772d8b8e6ba39d62e82af741fd931ca6e0c5bbc8f7dcb1956b1ea50
-
Size
728KB
-
Sample
211016-dccd7sbfd8
-
MD5
cc0bfabded1a759a3a81ccf2a983b80c
-
SHA1
1d19656922a9c341d2ef3f3f3a0f14e06b4fe920
-
SHA256
b319d247d772d8b8e6ba39d62e82af741fd931ca6e0c5bbc8f7dcb1956b1ea50
-
SHA512
dfe8d765802add5b54cd22c38a9193539474db522c85d3f5406a2750f881e364f8dcbff10255934f0c5aff2ea8dcfe368e293b9363ac2bf24cf37518c712498b
Static task
static1
Malware Config
Extracted
vidar
41.4
1008
https://mas.to/@sslam
-
profile_id
1008
Targets
-
-
Target
b319d247d772d8b8e6ba39d62e82af741fd931ca6e0c5bbc8f7dcb1956b1ea50
-
Size
728KB
-
MD5
cc0bfabded1a759a3a81ccf2a983b80c
-
SHA1
1d19656922a9c341d2ef3f3f3a0f14e06b4fe920
-
SHA256
b319d247d772d8b8e6ba39d62e82af741fd931ca6e0c5bbc8f7dcb1956b1ea50
-
SHA512
dfe8d765802add5b54cd22c38a9193539474db522c85d3f5406a2750f881e364f8dcbff10255934f0c5aff2ea8dcfe368e293b9363ac2bf24cf37518c712498b
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-