Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
31-05-2022 23:49
Static task
static1
Behavioral task
behavioral1
Sample
39BEE43DDD3E75352C918E0554ACAF8D8E78F0765678A.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
39BEE43DDD3E75352C918E0554ACAF8D8E78F0765678A.exe
-
Size
545KB
-
MD5
f75d3f9245837bf525c550af11676322
-
SHA1
3787b1420765f1839f072c3139220ac9a69acbb2
-
SHA256
39bee43ddd3e75352c918e0554acaf8d8e78f0765678a0ab704513ca18822a66
-
SHA512
7c825fbef7205331f186326464bc89c5ac2ee7fc3065edf382e0ed684c7807a738aff652c53248502781b4ee5854f54b72d357c318e1b4a12066100dc37128e2
Malware Config
Extracted
Family
vidar
Version
26.1
Botnet
237
C2
http://centos10.com/
Attributes
-
profile_id
237
Signatures
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1920-56-0x0000000000320000-0x00000000003A9000-memory.dmp family_vidar behavioral1/memory/1920-57-0x0000000000400000-0x000000000088B000-memory.dmp family_vidar