General
-
Target
33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935
-
Size
597KB
-
Sample
220303-d4tskahba6
-
MD5
6cd2a1ef915859f2e6cfaddfcc876c98
-
SHA1
9c8975025e9553c08546695b98e8b6987251def2
-
SHA256
33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935
-
SHA512
7862d7cda69e3d2c820551214caa24b96148863c3139af0406b953820554886d29741f15a4a81945e22f79039824f56c52ece0e43a55eefcca755a6cd6502a05
Static task
static1
Malware Config
Extracted
vidar
50.4
565
https://mastodon.online/@samsa11
https://koyu.space/@samsa2l
-
profile_id
565
Targets
-
-
Target
33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935
-
Size
597KB
-
MD5
6cd2a1ef915859f2e6cfaddfcc876c98
-
SHA1
9c8975025e9553c08546695b98e8b6987251def2
-
SHA256
33ac0ea43c425209053f9360bd243e68deca0eb5cb4e638c6da557eb36f78935
-
SHA512
7862d7cda69e3d2c820551214caa24b96148863c3139af0406b953820554886d29741f15a4a81945e22f79039824f56c52ece0e43a55eefcca755a6cd6502a05
-
Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-