General
-
Target
1D30.bin.zip
-
Size
231KB
-
Sample
220516-rb3rnagabr
-
MD5
dd4b25af4110a573f5c2397ee44a7cee
-
SHA1
a104d3322e04a6412afaf6918ede73ff7257647d
-
SHA256
3410cc6e8f02ca9b276714082ebddd2d34e750645741ae228351aff7d43c55d4
-
SHA512
0fec2035346add404b7fdb771a6d313ba459a7b54195cab200773247334950a6ed1bcac3c5fcad21ed33290fe92161ad9c7da40c7fa3f85213342c942141b87e
Static task
static1
Behavioral task
behavioral1
Sample
1D30.exe
Resource
win7-20220414-en
Malware Config
Extracted
vidar
52.1
937
https://t.me/verstappenf1r
https://climatejustice.social/@ronxik312
-
profile_id
937
Targets
-
-
Target
1D30.bin
-
Size
360KB
-
MD5
64c1336fcfe148773b61a2fc1f9384ce
-
SHA1
deb9ccd967564d2210634bfed1cd3ac53c3c12f5
-
SHA256
fd594ed8a9739eb4b729de2eeb89cbe5d41f4ed0869ead5105a7caa880077803
-
SHA512
e7b5ce208e31a2e94c8c87b6f46c7597934d9828b1d4967398be2b7c44a3c158a09b4c1ae34bb48d06781f7249b180e413c6b0ef7744af6153b29f8288bad4f7
-
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
-
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
-
Vidar Stealer
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-