Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    31-05-2022 23:49

General

  • Target

    39BEE43DDD3E75352C918E0554ACAF8D8E78F0765678A.exe

  • Size

    545KB

  • MD5

    f75d3f9245837bf525c550af11676322

  • SHA1

    3787b1420765f1839f072c3139220ac9a69acbb2

  • SHA256

    39bee43ddd3e75352c918e0554acaf8d8e78f0765678a0ab704513ca18822a66

  • SHA512

    7c825fbef7205331f186326464bc89c5ac2ee7fc3065edf382e0ed684c7807a738aff652c53248502781b4ee5854f54b72d357c318e1b4a12066100dc37128e2

Malware Config

Extracted

Family

vidar

Version

26.1

Botnet

237

C2

http://centos10.com/

Attributes
  • profile_id

    237

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

  • Vidar Stealer 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39BEE43DDD3E75352C918E0554ACAF8D8E78F0765678A.exe
    "C:\Users\Admin\AppData\Local\Temp\39BEE43DDD3E75352C918E0554ACAF8D8E78F0765678A.exe"
    1⤵
      PID:1920

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1920-54-0x0000000075F61000-0x0000000075F63000-memory.dmp

      Filesize

      8KB

    • memory/1920-55-0x000000000099B000-0x00000000009F2000-memory.dmp

      Filesize

      348KB

    • memory/1920-56-0x0000000000320000-0x00000000003A9000-memory.dmp

      Filesize

      548KB

    • memory/1920-57-0x0000000000400000-0x000000000088B000-memory.dmp

      Filesize

      4.5MB

    • memory/1920-58-0x000000000099B000-0x00000000009F2000-memory.dmp

      Filesize

      348KB