General

  • Target

    2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch

  • Size

    19.8MB

  • Sample

    241220-2ay27awlgp

  • MD5

    7864deaa9953329b0a490dbab14fb98f

  • SHA1

    2264b7e1bd13754089844b82a363a243e9b2219e

  • SHA256

    1d4999768c08d43e6bb91df7d1e2d9903c23d06020b1f24dbe8d6b516a29b393

  • SHA512

    8dbf600e86ff2e19c685e040b6120b227f8726c1f38a31e1100f4cb27b8b58b711379838a9f63436a3921e97567f8e393ac0993b14e874af74d9ea2f27ba625d

  • SSDEEP

    49152:uALO5Ug0R4rbJv9iveDrquwzSN4lj3Gn2UQflFUUWxgRgPW2OVN3Pf4pJkKx6G6v:uAa5UPRI7ive/w8nZST/koD

Malware Config

Targets

    • Target

      2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch

    • Size

      19.8MB

    • MD5

      7864deaa9953329b0a490dbab14fb98f

    • SHA1

      2264b7e1bd13754089844b82a363a243e9b2219e

    • SHA256

      1d4999768c08d43e6bb91df7d1e2d9903c23d06020b1f24dbe8d6b516a29b393

    • SHA512

      8dbf600e86ff2e19c685e040b6120b227f8726c1f38a31e1100f4cb27b8b58b711379838a9f63436a3921e97567f8e393ac0993b14e874af74d9ea2f27ba625d

    • SSDEEP

      49152:uALO5Ug0R4rbJv9iveDrquwzSN4lj3Gn2UQflFUUWxgRgPW2OVN3Pf4pJkKx6G6v:uAa5UPRI7ive/w8nZST/koD

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.