General
-
Target
557d05250b90bc08706b269f78dbae75.exe
-
Size
664KB
-
Sample
210902-wfdk8d7byx
-
MD5
557d05250b90bc08706b269f78dbae75
-
SHA1
dbea155a15dbfeb16cd249d72f572b1694d2ea1f
-
SHA256
9abec502e3a5167e3851de29c80c681de2c6ab879a0c49646f92761018c7987b
-
SHA512
53676d497b3104fc49e9ebff65012d8cda5d38cc4f4968d5261acf90b60fe9086122e6ae510470b095540a7b35f1f194ea78cfc440d53ecf675197ceeaa9c6fe
Static task
static1
Behavioral task
behavioral1
Sample
557d05250b90bc08706b269f78dbae75.exe
Resource
win7-en
Malware Config
Extracted
vidar
40.3
1008
https://lenko349.tumblr.com/
-
profile_id
1008
Targets
-
-
Target
557d05250b90bc08706b269f78dbae75.exe
-
Size
664KB
-
MD5
557d05250b90bc08706b269f78dbae75
-
SHA1
dbea155a15dbfeb16cd249d72f572b1694d2ea1f
-
SHA256
9abec502e3a5167e3851de29c80c681de2c6ab879a0c49646f92761018c7987b
-
SHA512
53676d497b3104fc49e9ebff65012d8cda5d38cc4f4968d5261acf90b60fe9086122e6ae510470b095540a7b35f1f194ea78cfc440d53ecf675197ceeaa9c6fe
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-