Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-06-2022 20:38
Static task
static1
Behavioral task
behavioral1
Sample
build2.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
build2.exe
-
Size
603KB
-
MD5
a13e3b18282318c65f096bad322b3c50
-
SHA1
2c76179e95e583b588bcd516e94e7a2da52d5299
-
SHA256
ba981a94852325debf0e4b478266f6efd8e4e9c5b149fd9ad277be0be5045768
-
SHA512
acb009f4b622ab7e8729dac2c45da975ba2305612c9575e5c8ce221edecf2d49da2236fc28b00d8f424a251765b935d8acce7bf40a1557d9fc79ba446250e786
Malware Config
Extracted
Family
vidar
Version
51.4
Botnet
517
C2
https://t.me/hi20220403
https://mastodon.social/@sam5al
Attributes
-
profile_id
517
Signatures
-
Vidar Stealer 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4068-134-0x00000000021F0000-0x0000000002298000-memory.dmp family_vidar behavioral2/memory/4360-136-0x0000000000400000-0x00000000004AA000-memory.dmp family_vidar behavioral2/memory/4360-137-0x0000000000400000-0x00000000004AA000-memory.dmp family_vidar behavioral2/memory/4360-139-0x0000000000400000-0x00000000004AA000-memory.dmp family_vidar behavioral2/memory/4360-140-0x0000000000400000-0x00000000004AA000-memory.dmp family_vidar behavioral2/memory/4360-141-0x0000000000400000-0x00000000004AA000-memory.dmp family_vidar -
Suspicious use of SetThreadContext 1 IoCs
Processes:
build2.exedescription pid process target process PID 4068 set thread context of 4360 4068 build2.exe build2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
build2.exedescription pid process target process PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe PID 4068 wrote to memory of 4360 4068 build2.exe build2.exe