General
-
Target
5513747c5fc78ec6cac7c89927cc3a46a3a91c10e4949092390679b8c5032ec3
-
Size
847KB
-
Sample
210727-m3ysbhq6c6
-
MD5
a8e63b6418500ff80969ff8c97304a1e
-
SHA1
2179744738f04ab7180cca4ab39c15909ff8a892
-
SHA256
5513747c5fc78ec6cac7c89927cc3a46a3a91c10e4949092390679b8c5032ec3
-
SHA512
d7e510d01216a09c8ba63f9c0dc975d579aa6b3e66e3726edfb18e8c0d44f274254609e645d3b1fadb07c9c5cf36d9612c17b0f0941e92cb2f7dca65cab50472
Static task
static1
Malware Config
Extracted
vidar
39.7
517
https://shpak125.tumblr.com/
-
profile_id
517
Targets
-
-
Target
5513747c5fc78ec6cac7c89927cc3a46a3a91c10e4949092390679b8c5032ec3
-
Size
847KB
-
MD5
a8e63b6418500ff80969ff8c97304a1e
-
SHA1
2179744738f04ab7180cca4ab39c15909ff8a892
-
SHA256
5513747c5fc78ec6cac7c89927cc3a46a3a91c10e4949092390679b8c5032ec3
-
SHA512
d7e510d01216a09c8ba63f9c0dc975d579aa6b3e66e3726edfb18e8c0d44f274254609e645d3b1fadb07c9c5cf36d9612c17b0f0941e92cb2f7dca65cab50472
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-