General
-
Target
9140e9416f6ef6e606be627db24e72442e23fb9b8a6aa3fa460cd7015bfd5523
-
Size
661KB
-
Sample
210921-19mb1adder
-
MD5
4036d570dca2a1d3ea3d16663f92270a
-
SHA1
2917cd0b3df70a283fc622a743f3e43820b7bd82
-
SHA256
9140e9416f6ef6e606be627db24e72442e23fb9b8a6aa3fa460cd7015bfd5523
-
SHA512
7f5da430165bd0b2f709d45c0040bd35679b908842fedddce7628f4bed19304aca2a673e1924a2cdd66bb404257a178262a67414bc31cdfae42ceb0650530839
Static task
static1
Malware Config
Extracted
vidar
40.9
828
https://stacenko668.tumblr.com/
-
profile_id
828
Targets
-
-
Target
9140e9416f6ef6e606be627db24e72442e23fb9b8a6aa3fa460cd7015bfd5523
-
Size
661KB
-
MD5
4036d570dca2a1d3ea3d16663f92270a
-
SHA1
2917cd0b3df70a283fc622a743f3e43820b7bd82
-
SHA256
9140e9416f6ef6e606be627db24e72442e23fb9b8a6aa3fa460cd7015bfd5523
-
SHA512
7f5da430165bd0b2f709d45c0040bd35679b908842fedddce7628f4bed19304aca2a673e1924a2cdd66bb404257a178262a67414bc31cdfae42ceb0650530839
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-