General
-
Target
028e110e35ec6f116521ec73e424da232b578c05f274a250611e3085e1d37f32
-
Size
683KB
-
Sample
220528-ehqz8agaa5
-
MD5
92def7f5c05e2aeec0c51991724def95
-
SHA1
8609585394aae744d881faf7483c9f41c859cc0d
-
SHA256
028e110e35ec6f116521ec73e424da232b578c05f274a250611e3085e1d37f32
-
SHA512
0f0a8451f0536a774af54d3f7c74aef72463f8f9a9a816758f2eb1d440a2e88c84096bdfb03e04eecce06d9241fc5e456eda648016b14d894148a67e57a5fb08
Static task
static1
Behavioral task
behavioral1
Sample
028e110e35ec6f116521ec73e424da232b578c05f274a250611e3085e1d37f32.lnk
Resource
win7-20220414-en
Malware Config
Extracted
http://qwertzx.ru/qwerty.ps1
Extracted
arkei
Default
Targets
-
-
Target
028e110e35ec6f116521ec73e424da232b578c05f274a250611e3085e1d37f32
-
Size
683KB
-
MD5
92def7f5c05e2aeec0c51991724def95
-
SHA1
8609585394aae744d881faf7483c9f41c859cc0d
-
SHA256
028e110e35ec6f116521ec73e424da232b578c05f274a250611e3085e1d37f32
-
SHA512
0f0a8451f0536a774af54d3f7c74aef72463f8f9a9a816758f2eb1d440a2e88c84096bdfb03e04eecce06d9241fc5e456eda648016b14d894148a67e57a5fb08
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
suricata: ET MALWARE Windows executable base64 encoded
suricata: ET MALWARE Windows executable base64 encoded
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-