General
-
Target
eufive_20211108-162929(2)
-
Size
688KB
-
Sample
211108-xpsfqschd6
-
MD5
3f36f9d968431d0945b78ebca0a4adbb
-
SHA1
ad058a3f84037b7f5e442960d4bf388549ab0057
-
SHA256
fe96a24886ace072952dae318c99362572ff421c903ab154cf73d8649530c587
-
SHA512
aae4d9bc11077ced64d2cf1c96a428462c010231bd40cde83e44f10794a3f9c4807061bb4f09dd68370125af033558ccadaa44a923f0093589704ae63553e183
Static task
static1
Behavioral task
behavioral1
Sample
eufive_20211108-162929(2).exe
Resource
win7-en-20211104
Malware Config
Extracted
vidar
48.1
824
https://koyu.space/@rspich
-
profile_id
824
Targets
-
-
Target
eufive_20211108-162929(2)
-
Size
688KB
-
MD5
3f36f9d968431d0945b78ebca0a4adbb
-
SHA1
ad058a3f84037b7f5e442960d4bf388549ab0057
-
SHA256
fe96a24886ace072952dae318c99362572ff421c903ab154cf73d8649530c587
-
SHA512
aae4d9bc11077ced64d2cf1c96a428462c010231bd40cde83e44f10794a3f9c4807061bb4f09dd68370125af033558ccadaa44a923f0093589704ae63553e183
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-