General
-
Target
f267c5587b883f7df18621f21a93af16bc68df22cdaf66c054e56fec1c62d9b6
-
Size
722KB
-
Sample
211016-p4e5yscab2
-
MD5
681539d9f63fb8e3a2a445aa446ecd05
-
SHA1
b22c0843367912921fbe5713a46b87bf0d2da87a
-
SHA256
f267c5587b883f7df18621f21a93af16bc68df22cdaf66c054e56fec1c62d9b6
-
SHA512
fa6a03a0d71e8b39b6486bdac189e15781abac12de4502701585fc3cd56859e424f995200589a2c809567fe6a5bb7b617fc6e99fd75f0bd4f56fa28c9d96da82
Static task
static1
Malware Config
Extracted
vidar
41.4
1008
https://mas.to/@sslam
-
profile_id
1008
Targets
-
-
Target
f267c5587b883f7df18621f21a93af16bc68df22cdaf66c054e56fec1c62d9b6
-
Size
722KB
-
MD5
681539d9f63fb8e3a2a445aa446ecd05
-
SHA1
b22c0843367912921fbe5713a46b87bf0d2da87a
-
SHA256
f267c5587b883f7df18621f21a93af16bc68df22cdaf66c054e56fec1c62d9b6
-
SHA512
fa6a03a0d71e8b39b6486bdac189e15781abac12de4502701585fc3cd56859e424f995200589a2c809567fe6a5bb7b617fc6e99fd75f0bd4f56fa28c9d96da82
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-