General
-
Target
3ec16dd585cf17801e35368e721103064f2e772ec1e796ffe3ffb11c64111d1a
-
Size
302KB
-
Sample
220119-x89t5acfbl
-
MD5
3524bfe3a38b6cd1d7bb5543e621c967
-
SHA1
78afb42c2429ccb919682d75f6f9940dbc73c3f4
-
SHA256
3ec16dd585cf17801e35368e721103064f2e772ec1e796ffe3ffb11c64111d1a
-
SHA512
04e539679b7acd389fd4917ca86779a6127c0d7b4f4a5cac4f445841a5e0237622cb6e15a21e795bc7216ab55f3f0c771880051f8bd831202cbf2261029d5ef4
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
3ec16dd585cf17801e35368e721103064f2e772ec1e796ffe3ffb11c64111d1a
-
Size
302KB
-
MD5
3524bfe3a38b6cd1d7bb5543e621c967
-
SHA1
78afb42c2429ccb919682d75f6f9940dbc73c3f4
-
SHA256
3ec16dd585cf17801e35368e721103064f2e772ec1e796ffe3ffb11c64111d1a
-
SHA512
04e539679b7acd389fd4917ca86779a6127c0d7b4f4a5cac4f445841a5e0237622cb6e15a21e795bc7216ab55f3f0c771880051f8bd831202cbf2261029d5ef4
-
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-