General
-
Target
b20a974b855f73204e9cd5d445f2112d.exe
-
Size
255KB
-
Sample
221004-h6nfsahbd5
-
MD5
b20a974b855f73204e9cd5d445f2112d
-
SHA1
4f29402bbccb50859b439723bb6c87516d83999b
-
SHA256
fa64bc211d04136ec885512c04ca91ed3b7ac8f4cf3cad1b254590afbede44d1
-
SHA512
6977b9165fb10657c577db5b5becce9e45caab31ddc4b8fde69f08e762b5cda68c8604cb9385d0eb9dd18c240ad02b2d5b13bf0d39a6d10dc932de724c42ef39
-
SSDEEP
6144:VX2Ree+YJZRfWP9qmeyRRlJQG9GguRJ5r9dtpU:VX2Ree+YJZReP96i6G9GpNDI
Static task
static1
Behavioral task
behavioral1
Sample
b20a974b855f73204e9cd5d445f2112d.exe
Resource
win7-20220812-en
Malware Config
Extracted
vidar
54.9
517
https://t.me/larsenup
https://ioc.exchange/@zebra54
-
profile_id
517
Targets
-
-
Target
b20a974b855f73204e9cd5d445f2112d.exe
-
Size
255KB
-
MD5
b20a974b855f73204e9cd5d445f2112d
-
SHA1
4f29402bbccb50859b439723bb6c87516d83999b
-
SHA256
fa64bc211d04136ec885512c04ca91ed3b7ac8f4cf3cad1b254590afbede44d1
-
SHA512
6977b9165fb10657c577db5b5becce9e45caab31ddc4b8fde69f08e762b5cda68c8604cb9385d0eb9dd18c240ad02b2d5b13bf0d39a6d10dc932de724c42ef39
-
SSDEEP
6144:VX2Ree+YJZRfWP9qmeyRRlJQG9GguRJ5r9dtpU:VX2Ree+YJZReP96i6G9GpNDI
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-