General
-
Target
5c3301e1b4ec121f2562648796ef7d13408053849d9680d10f1d194e9ab894b5
-
Size
2.2MB
-
Sample
211117-kyxqlaegfn
-
MD5
a3919cf297b18238230bc02e6e086cc5
-
SHA1
3b655b7ca6be24f7475baa74265ae9f493fbca86
-
SHA256
5c3301e1b4ec121f2562648796ef7d13408053849d9680d10f1d194e9ab894b5
-
SHA512
4b49a783bcf5ec9f855ecb9e62f7bc2b86f71ab55f4c8bfce56c8f2083bf70376fc589ad29bddddfa723d66350af6a5d7a019359e046f68570a3e4648a8f8e77
Static task
static1
Malware Config
Extracted
vidar
48.6
869
https://mastodon.online/@valhalla
https://koyu.space/@valhalla
-
profile_id
869
Targets
-
-
Target
5c3301e1b4ec121f2562648796ef7d13408053849d9680d10f1d194e9ab894b5
-
Size
2.2MB
-
MD5
a3919cf297b18238230bc02e6e086cc5
-
SHA1
3b655b7ca6be24f7475baa74265ae9f493fbca86
-
SHA256
5c3301e1b4ec121f2562648796ef7d13408053849d9680d10f1d194e9ab894b5
-
SHA512
4b49a783bcf5ec9f855ecb9e62f7bc2b86f71ab55f4c8bfce56c8f2083bf70376fc589ad29bddddfa723d66350af6a5d7a019359e046f68570a3e4648a8f8e77
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-