General
-
Target
f20d8f923ba4065f004bbb79086a8637.exe
-
Size
608KB
-
Sample
220908-ptf99sefa2
-
MD5
f20d8f923ba4065f004bbb79086a8637
-
SHA1
f43809b21b6e4dc9eba2d4681b2d8fc10384edc3
-
SHA256
3b275eb3041764efa0c25789652714f73013eba1cca9636d1dd201db733e16c1
-
SHA512
70bc9ea694a32ef7625ddc33b40d0a0c0c7e149886938304052740ac45d1d547fd8d2a08e085103fe6a9a8b7d165f3364a770e92ab0c8b00235e77e56ef84867
-
SSDEEP
12288:NFG1MZ0KtvusH5nfVwcCU/gb5uGJ5j/irX7fy29C+A30Fo9srKdMEFqW3QjyVInn:y185ndiU/4J/irX7q2MV0kWYyeJni
Static task
static1
Behavioral task
behavioral1
Sample
f20d8f923ba4065f004bbb79086a8637.exe
Resource
win7-20220812-en
Malware Config
Extracted
vidar
54.2
1438
https://t.me/tigogames
https://ioc.exchange/@tiagoa26
-
profile_id
1438
Targets
-
-
Target
f20d8f923ba4065f004bbb79086a8637.exe
-
Size
608KB
-
MD5
f20d8f923ba4065f004bbb79086a8637
-
SHA1
f43809b21b6e4dc9eba2d4681b2d8fc10384edc3
-
SHA256
3b275eb3041764efa0c25789652714f73013eba1cca9636d1dd201db733e16c1
-
SHA512
70bc9ea694a32ef7625ddc33b40d0a0c0c7e149886938304052740ac45d1d547fd8d2a08e085103fe6a9a8b7d165f3364a770e92ab0c8b00235e77e56ef84867
-
SSDEEP
12288:NFG1MZ0KtvusH5nfVwcCU/gb5uGJ5j/irX7fy29C+A30Fo9srKdMEFqW3QjyVInn:y185ndiU/4J/irX7q2MV0kWYyeJni
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-