Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220812-en -
submitted
08-09-2022 12:37
Static task
static1
Behavioral task
behavioral1
Sample
f20d8f923ba4065f004bbb79086a8637.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
f20d8f923ba4065f004bbb79086a8637.exe
-
Size
608KB
-
MD5
f20d8f923ba4065f004bbb79086a8637
-
SHA1
f43809b21b6e4dc9eba2d4681b2d8fc10384edc3
-
SHA256
3b275eb3041764efa0c25789652714f73013eba1cca9636d1dd201db733e16c1
-
SHA512
70bc9ea694a32ef7625ddc33b40d0a0c0c7e149886938304052740ac45d1d547fd8d2a08e085103fe6a9a8b7d165f3364a770e92ab0c8b00235e77e56ef84867
-
SSDEEP
12288:NFG1MZ0KtvusH5nfVwcCU/gb5uGJ5j/irX7fy29C+A30Fo9srKdMEFqW3QjyVInn:y185ndiU/4J/irX7q2MV0kWYyeJni
Malware Config
Extracted
Family
vidar
Version
54.2
Botnet
1438
C2
https://t.me/tigogames
https://ioc.exchange/@tiagoa26
Attributes
-
profile_id
1438
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f20d8f923ba4065f004bbb79086a8637.exedescription pid process target process PID 1896 set thread context of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f20d8f923ba4065f004bbb79086a8637.exedescription pid process target process PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe PID 1896 wrote to memory of 1940 1896 f20d8f923ba4065f004bbb79086a8637.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f20d8f923ba4065f004bbb79086a8637.exe"C:\Users\Admin\AppData\Local\Temp\f20d8f923ba4065f004bbb79086a8637.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1940
-