General
-
Target
cfd33d516ee92bc96d6eb380b7f8e7fb
-
Size
3.0MB
-
Sample
220602-hv5kxsdff9
-
MD5
cfd33d516ee92bc96d6eb380b7f8e7fb
-
SHA1
8b1a6c2d8430ad40674d7aa9b564261c8b5f4f85
-
SHA256
66f7d8cb4ae8a8a1a9989f4a66070f9d7eefa029e2c7ff575e447827abbfcb0b
-
SHA512
53180a9fcc2dce7fb0edbf2831a079804430f2b2255dd76b2c337dc0628f3fde69535668fba86a34530fac4956df3ad671f2ad3e6497130b2cf9f5d64e7d3481
Static task
static1
Behavioral task
behavioral1
Sample
cfd33d516ee92bc96d6eb380b7f8e7fb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cfd33d516ee92bc96d6eb380b7f8e7fb.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
arkei
Default
Targets
-
-
Target
cfd33d516ee92bc96d6eb380b7f8e7fb
-
Size
3.0MB
-
MD5
cfd33d516ee92bc96d6eb380b7f8e7fb
-
SHA1
8b1a6c2d8430ad40674d7aa9b564261c8b5f4f85
-
SHA256
66f7d8cb4ae8a8a1a9989f4a66070f9d7eefa029e2c7ff575e447827abbfcb0b
-
SHA512
53180a9fcc2dce7fb0edbf2831a079804430f2b2255dd76b2c337dc0628f3fde69535668fba86a34530fac4956df3ad671f2ad3e6497130b2cf9f5d64e7d3481
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-