General
-
Target
d311d95c1cbae9b5a21e2c52995a2ae6.exe
-
Size
375KB
-
Sample
220911-hj7wxabbc5
-
MD5
d311d95c1cbae9b5a21e2c52995a2ae6
-
SHA1
e6334f2bd1a4fc2926acff2888abb6835605ce70
-
SHA256
33736e8940993c97705403cdbef1ceacb862b4a2fd126cd99b58718b937a9362
-
SHA512
abe975a92068a9a77f9e0bff43bc12d66f330e2ae92edc45abc1367168c61477cf6fcba1368e20467576f473aca7d09ad14c97d3417b557f26fb79221a4bcf24
-
SSDEEP
6144:HhtAlyCzt2Lmi0WCQD4erl+IPNqh/cDluYEBKTm46X0V77AoHuASdOX:HhtAPMmi0WCqvrl+IlNl/EkTmfEVdsOX
Static task
static1
Behavioral task
behavioral1
Sample
d311d95c1cbae9b5a21e2c52995a2ae6.exe
Resource
win7-20220901-en
Malware Config
Extracted
vidar
54.2
1438
https://t.me/tigogames
https://ioc.exchange/@tiagoa26
-
profile_id
1438
Targets
-
-
Target
d311d95c1cbae9b5a21e2c52995a2ae6.exe
-
Size
375KB
-
MD5
d311d95c1cbae9b5a21e2c52995a2ae6
-
SHA1
e6334f2bd1a4fc2926acff2888abb6835605ce70
-
SHA256
33736e8940993c97705403cdbef1ceacb862b4a2fd126cd99b58718b937a9362
-
SHA512
abe975a92068a9a77f9e0bff43bc12d66f330e2ae92edc45abc1367168c61477cf6fcba1368e20467576f473aca7d09ad14c97d3417b557f26fb79221a4bcf24
-
SSDEEP
6144:HhtAlyCzt2Lmi0WCQD4erl+IPNqh/cDluYEBKTm46X0V77AoHuASdOX:HhtAPMmi0WCqvrl+IlNl/EkTmfEVdsOX
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-