General
-
Target
57994709.exe
-
Size
661KB
-
Sample
220323-e9fnkafcf5
-
MD5
b8fb898ec2cab9c10329175a89ca4a79
-
SHA1
b51d1d227b347e7230732175165af6a8357579c4
-
SHA256
8860ea573d5feae4a267aaa8cb8bf8c47f9c2c50e18ab3fc73d785afc89516cc
-
SHA512
b0d00ee5d9297e8690fbb8566f8f3c0e47cd04534ea50aacabdbfef3cfb09c853a78db2a8ba06125f5416265cb8b2f5d1585109e950e66fd0b71ba2310789f1d
Static task
static1
Behavioral task
behavioral1
Sample
57994709.exe
Resource
win7-20220311-en
Malware Config
Extracted
vidar
50.7
565
https://ruhr.social/@sam9al
https://koyu.space/@samsa2l
-
profile_id
565
Targets
-
-
Target
57994709.exe
-
Size
661KB
-
MD5
b8fb898ec2cab9c10329175a89ca4a79
-
SHA1
b51d1d227b347e7230732175165af6a8357579c4
-
SHA256
8860ea573d5feae4a267aaa8cb8bf8c47f9c2c50e18ab3fc73d785afc89516cc
-
SHA512
b0d00ee5d9297e8690fbb8566f8f3c0e47cd04534ea50aacabdbfef3cfb09c853a78db2a8ba06125f5416265cb8b2f5d1585109e950e66fd0b71ba2310789f1d
-
Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-