General
-
Target
e5b526dcb8d88aa521d07f26dbc70fc2467a8e915cee41e30ba44c0a288c8b6b
-
Size
725KB
-
Sample
211015-rt744abgdj
-
MD5
c4a9871b5afe1a622922a3d41d8f4a5c
-
SHA1
b1c3a76874676c6901eebf79a1cbe8a8407e52b5
-
SHA256
e5b526dcb8d88aa521d07f26dbc70fc2467a8e915cee41e30ba44c0a288c8b6b
-
SHA512
0cf64a382f1049856e1584c9f29806b552596a71a80ef5b50ce2f6fd54109fb88265308f03d3e21a9995cd67b872b91d4bf7f51a8294b02157db437e3c1dc21a
Static task
static1
Malware Config
Extracted
vidar
41.3
1008
https://mas.to/@oleg98
-
profile_id
1008
Targets
-
-
Target
e5b526dcb8d88aa521d07f26dbc70fc2467a8e915cee41e30ba44c0a288c8b6b
-
Size
725KB
-
MD5
c4a9871b5afe1a622922a3d41d8f4a5c
-
SHA1
b1c3a76874676c6901eebf79a1cbe8a8407e52b5
-
SHA256
e5b526dcb8d88aa521d07f26dbc70fc2467a8e915cee41e30ba44c0a288c8b6b
-
SHA512
0cf64a382f1049856e1584c9f29806b552596a71a80ef5b50ce2f6fd54109fb88265308f03d3e21a9995cd67b872b91d4bf7f51a8294b02157db437e3c1dc21a
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-