General
-
Target
https://polovoiinspektor.shop/PolymerReload.exe
-
Sample
241220-awh5bavndm
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://polovoiinspektor.shop/PolymerReload.exe
Resource
win10ltsc2021-20241211-es
windows10-ltsc 2021-x64
29 signatures
1200 seconds
Malware Config
Targets
-
-
Target
https://polovoiinspektor.shop/PolymerReload.exe
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-