General
-
Target
6f943d65dcd851c0f5209915f9da7937b474fe40cb3da03579916ebb4f192e5d
-
Size
159KB
-
Sample
220615-vledlabdg4
-
MD5
e109ffd6170183fc6e8ab7fcbf07d9f6
-
SHA1
6727234317ee5318ef83fbef4b0cf2510e262405
-
SHA256
6f943d65dcd851c0f5209915f9da7937b474fe40cb3da03579916ebb4f192e5d
-
SHA512
138ca2a6c3b1e67b9d6e849e66850fa3b187e89c780156582446fa602b615e684585157d524283010115e4c748d58985c2c1252e0db623513ba098ba116c3c6c
Static task
static1
Malware Config
Extracted
arkei
Default
Targets
-
-
Target
6f943d65dcd851c0f5209915f9da7937b474fe40cb3da03579916ebb4f192e5d
-
Size
159KB
-
MD5
e109ffd6170183fc6e8ab7fcbf07d9f6
-
SHA1
6727234317ee5318ef83fbef4b0cf2510e262405
-
SHA256
6f943d65dcd851c0f5209915f9da7937b474fe40cb3da03579916ebb4f192e5d
-
SHA512
138ca2a6c3b1e67b9d6e849e66850fa3b187e89c780156582446fa602b615e684585157d524283010115e4c748d58985c2c1252e0db623513ba098ba116c3c6c
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Generic gate .php GET with minimal headers
suricata: ET MALWARE Generic gate .php GET with minimal headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
suricata: ET MALWARE Win32/Vidar Variant/Mars CnC Activity (GET)
suricata: ET MALWARE Win32/Vidar Variant/Mars CnC Activity (GET)
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-