Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-04-2022 11:52
Static task
static1
Behavioral task
behavioral1
Sample
bc4d1e8e09905b7dd1d4b14ae7ba3b100e1baa7aeb567e225107d4439da03403.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
bc4d1e8e09905b7dd1d4b14ae7ba3b100e1baa7aeb567e225107d4439da03403.exe
-
Size
635KB
-
MD5
ebfb5ded5dc595e22ee02b08597b93eb
-
SHA1
8c33736b8b3dc750027ef49b1059d5d3a231182a
-
SHA256
bc4d1e8e09905b7dd1d4b14ae7ba3b100e1baa7aeb567e225107d4439da03403
-
SHA512
e74d3f71ece40008cdcb7bcdfc6547ca406e4fb3fd3048177648d0ae906ad11223412963ee6b2b3ebe70a14006bc4ddb9d387b129a4f27fd34c4e8a9f5afdead
Malware Config
Extracted
Family
vidar
Version
51.7
Botnet
977
C2
https://t.me/hi20220412
https://noc.social/@samal6
Attributes
-
profile_id
977
Signatures
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1580-57-0x00000000004D0000-0x000000000057F000-memory.dmp family_vidar behavioral1/memory/1580-58-0x0000000000400000-0x00000000004C7000-memory.dmp family_vidar