General
-
Target
fce324e2d66e0cbf7898e6ec58abeac72ff6cb7f3b6fe6645f6441e23f64ef4b.exe
-
Size
728KB
-
Sample
250102-jzd47ssnay
-
MD5
f379aba783c5b50aeb3e1fac0b2a7660
-
SHA1
9dcc304943b2645a70abaf38933caaa590fb5a90
-
SHA256
fce324e2d66e0cbf7898e6ec58abeac72ff6cb7f3b6fe6645f6441e23f64ef4b
-
SHA512
a53ac655cc31f74327679f8df7fec526de028c279e1fb917d6dd88a196df4a0cf7d4baf0edd3b3ccad4a30a8060e59836ad4927092a50840ecdb0be68b93d1da
-
SSDEEP
12288:WER9K8FUeR5Z9tRvSCJ6UJUdQ3MGKTOxT8LkMAr156KuGVW9HUPXNJ5AQAh5ShNI:WELNFUeLzvFAUOdQDKTbkMATpWxU1oiW
Static task
static1
Behavioral task
behavioral1
Sample
fce324e2d66e0cbf7898e6ec58abeac72ff6cb7f3b6fe6645f6441e23f64ef4b.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
10.4
237
http://direstolakolai.top/
-
profile_id
237
Targets
-
-
Target
fce324e2d66e0cbf7898e6ec58abeac72ff6cb7f3b6fe6645f6441e23f64ef4b.exe
-
Size
728KB
-
MD5
f379aba783c5b50aeb3e1fac0b2a7660
-
SHA1
9dcc304943b2645a70abaf38933caaa590fb5a90
-
SHA256
fce324e2d66e0cbf7898e6ec58abeac72ff6cb7f3b6fe6645f6441e23f64ef4b
-
SHA512
a53ac655cc31f74327679f8df7fec526de028c279e1fb917d6dd88a196df4a0cf7d4baf0edd3b3ccad4a30a8060e59836ad4927092a50840ecdb0be68b93d1da
-
SSDEEP
12288:WER9K8FUeR5Z9tRvSCJ6UJUdQ3MGKTOxT8LkMAr156KuGVW9HUPXNJ5AQAh5ShNI:WELNFUeLzvFAUOdQDKTbkMATpWxU1oiW
-
Vidar family
-
Vidar Stealer
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-