General
-
Target
9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3
-
Size
2.2MB
-
Sample
211117-lb4q3aehak
-
MD5
2b08729f793ba8efccff549b500432e4
-
SHA1
61d83dfab504c1d9698922d57ddcf7295899ae86
-
SHA256
9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3
-
SHA512
1657d8c63b1c07c12825a66e2f317e89e48956d067a69d1561d45ffd201af054cb1cd98d30a3086b6ad8aeef8d13b771581d6fcdaac347c0f40fdbceb3f4aadb
Static task
static1
Malware Config
Extracted
vidar
48.6
869
https://mastodon.online/@valhalla
https://koyu.space/@valhalla
-
profile_id
869
Targets
-
-
Target
9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3
-
Size
2.2MB
-
MD5
2b08729f793ba8efccff549b500432e4
-
SHA1
61d83dfab504c1d9698922d57ddcf7295899ae86
-
SHA256
9dbeccbbcd59bd80f7e9a01878e334af6df9b767298eb029f5cb82b1283f51d3
-
SHA512
1657d8c63b1c07c12825a66e2f317e89e48956d067a69d1561d45ffd201af054cb1cd98d30a3086b6ad8aeef8d13b771581d6fcdaac347c0f40fdbceb3f4aadb
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-