General
-
Target
5344dfd605a4ef3e28022fdadfc1f4ecb99c94371238244f78ae2b9e3f15b515
-
Size
664KB
-
Sample
220308-jlz5hsffck
-
MD5
94a8611b4c40e83ca5319c142ea8a7e4
-
SHA1
68ff4682c5d4885bb2bfac0d639a8b9015f06e84
-
SHA256
5344dfd605a4ef3e28022fdadfc1f4ecb99c94371238244f78ae2b9e3f15b515
-
SHA512
40741346a25d9fbad1b0ecd6bba1f51fbcbf618cca857e30e01794e9bcb1579216c9e8f75623db7f4c52774fa626147c6bfb104f18cdc44d89cbe8a29f3569bf
Static task
static1
Malware Config
Extracted
vidar
50.5
565
https://c.im/@sam3al
https://mas.to/@s4msalo
-
profile_id
565
Targets
-
-
Target
5344dfd605a4ef3e28022fdadfc1f4ecb99c94371238244f78ae2b9e3f15b515
-
Size
664KB
-
MD5
94a8611b4c40e83ca5319c142ea8a7e4
-
SHA1
68ff4682c5d4885bb2bfac0d639a8b9015f06e84
-
SHA256
5344dfd605a4ef3e28022fdadfc1f4ecb99c94371238244f78ae2b9e3f15b515
-
SHA512
40741346a25d9fbad1b0ecd6bba1f51fbcbf618cca857e30e01794e9bcb1579216c9e8f75623db7f4c52774fa626147c6bfb104f18cdc44d89cbe8a29f3569bf
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-