General
-
Target
eda548b9ecb44f1c5a9851c598cc7a2b4d8caadd78d153ecee23dbcb1bb1c26d
-
Size
1024KB
-
Sample
220521-mjp4babgh4
-
MD5
7234fec90a0880b7d545a3629fa2eff1
-
SHA1
ef73162be5228d90ad782616ef6ed229cb169f62
-
SHA256
eda548b9ecb44f1c5a9851c598cc7a2b4d8caadd78d153ecee23dbcb1bb1c26d
-
SHA512
118dce34e14e83baaf96cd2af1755fee0abc001e051ba81503088ec10a72a2fc87bba708b5ead9882e67b90d111e2e902ef9a44084b47380722ce8b304f10be0
Static task
static1
Behavioral task
behavioral1
Sample
eda548b9ecb44f1c5a9851c598cc7a2b4d8caadd78d153ecee23dbcb1bb1c26d.exe
Resource
win7-20220414-en
Malware Config
Extracted
vidar
24.4
602
http://yukondeltas.com/
-
profile_id
602
Targets
-
-
Target
eda548b9ecb44f1c5a9851c598cc7a2b4d8caadd78d153ecee23dbcb1bb1c26d
-
Size
1024KB
-
MD5
7234fec90a0880b7d545a3629fa2eff1
-
SHA1
ef73162be5228d90ad782616ef6ed229cb169f62
-
SHA256
eda548b9ecb44f1c5a9851c598cc7a2b4d8caadd78d153ecee23dbcb1bb1c26d
-
SHA512
118dce34e14e83baaf96cd2af1755fee0abc001e051ba81503088ec10a72a2fc87bba708b5ead9882e67b90d111e2e902ef9a44084b47380722ce8b304f10be0
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Vidar Stealer
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-