General
-
Target
f3499257cbdf648dcc3c1a25bbf5d61d.exe
-
Size
663KB
-
Sample
210902-wkbr19ge5j
-
MD5
f3499257cbdf648dcc3c1a25bbf5d61d
-
SHA1
5cd11a0ff628ec90334976be4d188299f171360b
-
SHA256
e3772dff75f0c54d488300728db28432abacffff7485f8da1b05a3f7cf0bc0ae
-
SHA512
6721e5b34e9eca5431f0dba53e7e9f67a23006f0fd9445e8841b9051eb18288465fa009296230e2fa95f952d59acea4cb8dce95546a84e32c98083bfd4a572c2
Static task
static1
Behavioral task
behavioral1
Sample
f3499257cbdf648dcc3c1a25bbf5d61d.exe
Resource
win7v20210408
Malware Config
Extracted
vidar
40.3
1008
https://lenko349.tumblr.com/
-
profile_id
1008
Targets
-
-
Target
f3499257cbdf648dcc3c1a25bbf5d61d.exe
-
Size
663KB
-
MD5
f3499257cbdf648dcc3c1a25bbf5d61d
-
SHA1
5cd11a0ff628ec90334976be4d188299f171360b
-
SHA256
e3772dff75f0c54d488300728db28432abacffff7485f8da1b05a3f7cf0bc0ae
-
SHA512
6721e5b34e9eca5431f0dba53e7e9f67a23006f0fd9445e8841b9051eb18288465fa009296230e2fa95f952d59acea4cb8dce95546a84e32c98083bfd4a572c2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-