General
-
Target
.
-
Size
722B
-
Sample
241223-pqanbazjcs
-
MD5
4f2067f591d1db46908f42c461b43bc8
-
SHA1
dbb6c2be0345648645105f5f8646662e319a01ba
-
SHA256
edebb1c19818a5dc2f09d95f6852c328e9427bc460c3517b543cdf101fba7d84
-
SHA512
5fde4eea4445de8ac73e510c43475b025d12d8f4e9c71e230d7b99a49efc8c6fa381bcda09295c26afb294bd67cf0a63c20f538dd3b66b702ca9f1ac75bf1c9a
Static task
static1
Behavioral task
behavioral1
Sample
.hta
Resource
win7-20240903-en
Malware Config
Extracted
https://polovoiinspektor.shop/secure/login.txt
Targets
-
-
Target
.
-
Size
722B
-
MD5
4f2067f591d1db46908f42c461b43bc8
-
SHA1
dbb6c2be0345648645105f5f8646662e319a01ba
-
SHA256
edebb1c19818a5dc2f09d95f6852c328e9427bc460c3517b543cdf101fba7d84
-
SHA512
5fde4eea4445de8ac73e510c43475b025d12d8f4e9c71e230d7b99a49efc8c6fa381bcda09295c26afb294bd67cf0a63c20f538dd3b66b702ca9f1ac75bf1c9a
-
Detect Vidar Stealer
-
Vidar family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-