Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-06-2022 00:08
Static task
static1
Behavioral task
behavioral1
Sample
16848a0985965c3cb323fc515f8d8ceaeb5847dbff7ec2ee42cbc9ecfa9f77ed.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
16848a0985965c3cb323fc515f8d8ceaeb5847dbff7ec2ee42cbc9ecfa9f77ed.exe
-
Size
727KB
-
MD5
b84decc4f2168a4ad9f2260f6afdcac7
-
SHA1
bc7dba9241d7793855b2cce2087b4271a1ac57fb
-
SHA256
16848a0985965c3cb323fc515f8d8ceaeb5847dbff7ec2ee42cbc9ecfa9f77ed
-
SHA512
fa8aa3bcbc3416a3170c1c1b3cf359ddafb0d390d312746878a78d25bfc3495d9ec429173633d9f4769022dcf354377ca00ff741999758badf3b9a891bc3737f
Malware Config
Extracted
Family
vidar
Version
41.4
Botnet
937
C2
https://mas.to/@sslam
Attributes
-
profile_id
937
Signatures
-
Vidar Stealer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4668-131-0x0000000003350000-0x0000000003426000-memory.dmp family_vidar behavioral2/memory/4668-132-0x0000000000400000-0x0000000001729000-memory.dmp family_vidar behavioral2/memory/4668-134-0x0000000000400000-0x0000000001729000-memory.dmp family_vidar -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4440 4668 WerFault.exe 16848a0985965c3cb323fc515f8d8ceaeb5847dbff7ec2ee42cbc9ecfa9f77ed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16848a0985965c3cb323fc515f8d8ceaeb5847dbff7ec2ee42cbc9ecfa9f77ed.exe"C:\Users\Admin\AppData\Local\Temp\16848a0985965c3cb323fc515f8d8ceaeb5847dbff7ec2ee42cbc9ecfa9f77ed.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 10282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4668 -ip 46681⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4668-130-0x00000000017ED000-0x000000000186A000-memory.dmpFilesize
500KB
-
memory/4668-131-0x0000000003350000-0x0000000003426000-memory.dmpFilesize
856KB
-
memory/4668-132-0x0000000000400000-0x0000000001729000-memory.dmpFilesize
19.2MB
-
memory/4668-133-0x00000000017ED000-0x000000000186A000-memory.dmpFilesize
500KB
-
memory/4668-134-0x0000000000400000-0x0000000001729000-memory.dmpFilesize
19.2MB