Analysis
-
max time kernel
95s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 05:18
Static task
static1
Behavioral task
behavioral1
Sample
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe
-
Size
2.1MB
-
MD5
23456ad6c1674099ea46af2c39aea29b
-
SHA1
a017e8ba079165d82d3398a83b3f057c7edb4b0e
-
SHA256
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad
-
SHA512
f5554062802097c67f1a80d428647821e87729ecd7e4eee075d54262a27e79b6fbaf274ba79d21b8aa7c3a982ba2943a7f397fe20eacf5cddd872ac4df500e7f
Malware Config
Extracted
Family
vidar
Version
50.1
Botnet
1120
C2
https://mastodon.online/@k1llerniax
https://koyu.space/@k1llerni2x
Attributes
-
profile_id
1120
Signatures
-
Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2596-132-0x0000000000CC0000-0x0000000000EB5000-memory.dmp family_vidar behavioral2/memory/2596-133-0x0000000000CC0000-0x0000000000EB5000-memory.dmp family_vidar behavioral2/memory/2596-137-0x0000000000CC0000-0x0000000000EB5000-memory.dmp family_vidar behavioral2/memory/2596-139-0x0000000000CC0000-0x0000000000EB5000-memory.dmp family_vidar behavioral2/memory/2596-141-0x0000000000CC0000-0x0000000000EB5000-memory.dmp family_vidar -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exepid process 2596 226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exepid process 2596 226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe 2596 226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe"C:\Users\Admin\AppData\Local\Temp\226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2596-130-0x0000000000CC0000-0x0000000000EB5000-memory.dmpFilesize
2.0MB
-
memory/2596-132-0x0000000000CC0000-0x0000000000EB5000-memory.dmpFilesize
2.0MB
-
memory/2596-131-0x0000000000CC0000-0x0000000000EB5000-memory.dmpFilesize
2.0MB
-
memory/2596-133-0x0000000000CC0000-0x0000000000EB5000-memory.dmpFilesize
2.0MB
-
memory/2596-134-0x0000000076B80000-0x0000000076D95000-memory.dmpFilesize
2.1MB
-
memory/2596-135-0x0000000075AD0000-0x0000000075D51000-memory.dmpFilesize
2.5MB
-
memory/2596-136-0x0000000001460000-0x00000000014AD000-memory.dmpFilesize
308KB
-
memory/2596-137-0x0000000000CC0000-0x0000000000EB5000-memory.dmpFilesize
2.0MB
-
memory/2596-138-0x00000000759E0000-0x0000000075AC3000-memory.dmpFilesize
908KB
-
memory/2596-139-0x0000000000CC0000-0x0000000000EB5000-memory.dmpFilesize
2.0MB
-
memory/2596-140-0x0000000001460000-0x00000000014AD000-memory.dmpFilesize
308KB
-
memory/2596-141-0x0000000000CC0000-0x0000000000EB5000-memory.dmpFilesize
2.0MB