General
-
Target
39ac77a388a0d1bf3ccb943bfb85c149faca485613d8744691cbad9b9d02ce2f
-
Size
449KB
-
Sample
220625-kxpctsgbf4
-
MD5
3e57f83b20df0c9a591757b1e254da6b
-
SHA1
60b5832469de13c6e878545a5ad77885300c735b
-
SHA256
39ac77a388a0d1bf3ccb943bfb85c149faca485613d8744691cbad9b9d02ce2f
-
SHA512
ddcf36cec7b85ab1382b455408db5a12459e29c00277a9d3c91c5dba85dd973bc56cb13205f84879a4f7030b0b8b411c86348efaf7d221e6ce1fda32297cfa91
Static task
static1
Behavioral task
behavioral1
Sample
39ac77a388a0d1bf3ccb943bfb85c149faca485613d8744691cbad9b9d02ce2f.exe
Resource
win7-20220414-en
Malware Config
Extracted
vidar
23.9
602
http://maudqueen.com/
-
profile_id
602
Targets
-
-
Target
39ac77a388a0d1bf3ccb943bfb85c149faca485613d8744691cbad9b9d02ce2f
-
Size
449KB
-
MD5
3e57f83b20df0c9a591757b1e254da6b
-
SHA1
60b5832469de13c6e878545a5ad77885300c735b
-
SHA256
39ac77a388a0d1bf3ccb943bfb85c149faca485613d8744691cbad9b9d02ce2f
-
SHA512
ddcf36cec7b85ab1382b455408db5a12459e29c00277a9d3c91c5dba85dd973bc56cb13205f84879a4f7030b0b8b411c86348efaf7d221e6ce1fda32297cfa91
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Vidar Stealer
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-