General
-
Target
771ae95fa5bd78ac6e3204e1a8d8671a3ca282fba523bb8ba10ab39886f2132f
-
Size
1024KB
-
Sample
220524-slgslsbbek
-
MD5
40bb81f49b8a7c37cb58ce9846bd579a
-
SHA1
42c74f7eab17abc8678abfa6bfda398aabe5d7cd
-
SHA256
771ae95fa5bd78ac6e3204e1a8d8671a3ca282fba523bb8ba10ab39886f2132f
-
SHA512
f1ce2976e9973cae09712ba823a4781ae1778a0650a84e4553083bc440fd5afc65f0ef8bce16aaabe6013ec607958feeb712eefdc1926e77fb7a1d3f4af66420
Static task
static1
Behavioral task
behavioral1
Sample
771ae95fa5bd78ac6e3204e1a8d8671a3ca282fba523bb8ba10ab39886f2132f.exe
Resource
win7-20220414-en
Malware Config
Extracted
vidar
24.4
602
http://yukondeltas.com/
-
profile_id
602
Targets
-
-
Target
771ae95fa5bd78ac6e3204e1a8d8671a3ca282fba523bb8ba10ab39886f2132f
-
Size
1024KB
-
MD5
40bb81f49b8a7c37cb58ce9846bd579a
-
SHA1
42c74f7eab17abc8678abfa6bfda398aabe5d7cd
-
SHA256
771ae95fa5bd78ac6e3204e1a8d8671a3ca282fba523bb8ba10ab39886f2132f
-
SHA512
f1ce2976e9973cae09712ba823a4781ae1778a0650a84e4553083bc440fd5afc65f0ef8bce16aaabe6013ec607958feeb712eefdc1926e77fb7a1d3f4af66420
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Vidar Stealer
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-