General
-
Target
arnatic_1.exe
-
Size
686KB
-
Sample
210708-x4k4zdmcb2
-
MD5
a957a80658f31c8fc864755deb2a0ca7
-
SHA1
8692ad674194f0901ee776ba99704f061babda95
-
SHA256
99117569330d3694ed281e0c5414c23aa33a5eb370494febb267925dd4a62208
-
SHA512
b46056d3971718a7770fef54d8a2af34363eb2e785f5506e9cb261c331954d12b810e46b297ebb98ccdf7f9bde73290d46491aa7a3276bdef51869651f7105af
Static task
static1
Behavioral task
behavioral1
Sample
arnatic_1.exe
Resource
win7v20210410
Malware Config
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Targets
-
-
Target
arnatic_1.exe
-
Size
686KB
-
MD5
a957a80658f31c8fc864755deb2a0ca7
-
SHA1
8692ad674194f0901ee776ba99704f061babda95
-
SHA256
99117569330d3694ed281e0c5414c23aa33a5eb370494febb267925dd4a62208
-
SHA512
b46056d3971718a7770fef54d8a2af34363eb2e785f5506e9cb261c331954d12b810e46b297ebb98ccdf7f9bde73290d46491aa7a3276bdef51869651f7105af
-
Vidar Stealer
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-