General
-
Target
7723cbc777fd9452bcabc5308c3216a624d80e3107ecfe395e1b7caa787e61c5
-
Size
646KB
-
Sample
220731-h5f1bafbfn
-
MD5
32ad4f10f745239fd5c3230a4b02f3b8
-
SHA1
5586d5066b3897332c956840cd7f89320be670a9
-
SHA256
7723cbc777fd9452bcabc5308c3216a624d80e3107ecfe395e1b7caa787e61c5
-
SHA512
bd0c60a952bbda4a5f2ec2f49186589e508d5a2f96d7a0e1adf126656475288859a9076cc3052fcc9c66c1597a4194843733c41a942de657ea795b54928493f4
Static task
static1
Behavioral task
behavioral1
Sample
7723cbc777fd9452bcabc5308c3216a624d80e3107ecfe395e1b7caa787e61c5.exe
Resource
win7-20220718-en
Malware Config
Extracted
vidar
12.3
499
http://hardrocklv.org/
-
profile_id
499
Targets
-
-
Target
7723cbc777fd9452bcabc5308c3216a624d80e3107ecfe395e1b7caa787e61c5
-
Size
646KB
-
MD5
32ad4f10f745239fd5c3230a4b02f3b8
-
SHA1
5586d5066b3897332c956840cd7f89320be670a9
-
SHA256
7723cbc777fd9452bcabc5308c3216a624d80e3107ecfe395e1b7caa787e61c5
-
SHA512
bd0c60a952bbda4a5f2ec2f49186589e508d5a2f96d7a0e1adf126656475288859a9076cc3052fcc9c66c1597a4194843733c41a942de657ea795b54928493f4
-
Vidar Stealer
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-