General
-
Target
2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795
-
Size
478KB
-
Sample
220531-l7c8zsahd2
-
MD5
a4155a9ac86e67f1abe1caa06ad09922
-
SHA1
12d89a80bf4ffe6422187723739b88ea7d2d3573
-
SHA256
2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795
-
SHA512
7aab92b5cf446f7d31dab6ad0ec6ed1bdaaec7e485c4509da95c606d602610986cce8cc15dbbd4a9057f600c0d33376535016c70670ab4bb4ca435875f407715
Static task
static1
Malware Config
Extracted
vidar
52.4
1366
https://t.me/foreigndocs
https://c.im/@ronxik31
-
profile_id
1366
Targets
-
-
Target
2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795
-
Size
478KB
-
MD5
a4155a9ac86e67f1abe1caa06ad09922
-
SHA1
12d89a80bf4ffe6422187723739b88ea7d2d3573
-
SHA256
2f17c87776c24df1bac5b312c3dfbd31b61637d7191a2522026c47f78efc5795
-
SHA512
7aab92b5cf446f7d31dab6ad0ec6ed1bdaaec7e485c4509da95c606d602610986cce8cc15dbbd4a9057f600c0d33376535016c70670ab4bb4ca435875f407715
-
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
-
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
-
Vidar Stealer
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-