General
-
Target
e3e3fab86a5f23fce4ad40791aead7f2558d164a2f40124d217fb391a926c948
-
Size
1.7MB
-
Sample
220202-w4cs6abagj
-
MD5
43aa5bbf3c44b243538175bd312cd8af
-
SHA1
ba2e14ccd5c148c7571671cc0d5f5a01049c38b9
-
SHA256
e3e3fab86a5f23fce4ad40791aead7f2558d164a2f40124d217fb391a926c948
-
SHA512
77cae2b22bc8f9686d3dc0cfced72e4bb0ef81163e2cfc7e12ac88acc828742974677e8a303cb334a2eea7bc1797f434d0793609065b60e9bd6d1b1f449deb6e
Static task
static1
Behavioral task
behavioral1
Sample
e3e3fab86a5f23fce4ad40791aead7f2558d164a2f40124d217fb391a926c948.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e3e3fab86a5f23fce4ad40791aead7f2558d164a2f40124d217fb391a926c948.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
vidar
50
1148
https://mastodon.social/@prophef6
https://noc.social/@prophef5
-
profile_id
1148
Targets
-
-
Target
e3e3fab86a5f23fce4ad40791aead7f2558d164a2f40124d217fb391a926c948
-
Size
1.7MB
-
MD5
43aa5bbf3c44b243538175bd312cd8af
-
SHA1
ba2e14ccd5c148c7571671cc0d5f5a01049c38b9
-
SHA256
e3e3fab86a5f23fce4ad40791aead7f2558d164a2f40124d217fb391a926c948
-
SHA512
77cae2b22bc8f9686d3dc0cfced72e4bb0ef81163e2cfc7e12ac88acc828742974677e8a303cb334a2eea7bc1797f434d0793609065b60e9bd6d1b1f449deb6e
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Vidar Stealer
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-