General
-
Target
16f358a2c51938127f5424b570ac3ee5
-
Size
373KB
-
Sample
220602-1nq33abha7
-
MD5
16f358a2c51938127f5424b570ac3ee5
-
SHA1
aeaa5233c747f386c19e1687a561f33de645e7c8
-
SHA256
c2a0afb662be00866ddd7a7454e52b5f82252a837121371aa10dd2393d9b1c33
-
SHA512
2413efbdbbccc8c4d28b128aeb88b02eb3844b39e3d46364d1a490fdead3a7d60a0a85c0f339b8feb68bbf75dfc86a2bcb71b632bcccb2cbe454e6523740f1a1
Static task
static1
Behavioral task
behavioral1
Sample
16f358a2c51938127f5424b570ac3ee5.exe
Resource
win7-20220414-en
Malware Config
Extracted
vidar
52.4
1163
https://t.me/foreigndocs
https://c.im/@ronxik31
-
profile_id
1163
Targets
-
-
Target
16f358a2c51938127f5424b570ac3ee5
-
Size
373KB
-
MD5
16f358a2c51938127f5424b570ac3ee5
-
SHA1
aeaa5233c747f386c19e1687a561f33de645e7c8
-
SHA256
c2a0afb662be00866ddd7a7454e52b5f82252a837121371aa10dd2393d9b1c33
-
SHA512
2413efbdbbccc8c4d28b128aeb88b02eb3844b39e3d46364d1a490fdead3a7d60a0a85c0f339b8feb68bbf75dfc86a2bcb71b632bcccb2cbe454e6523740f1a1
-
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-