General
-
Target
file.exe
-
Size
359KB
-
Sample
221012-tn3crsahf3
-
MD5
a1c33d360b68460d9b42d30ba8eb0b66
-
SHA1
9a26e01b7330c77a2f15e39c0da564003841513a
-
SHA256
1bd4abc21125d116ca1b721d180e1c36dd0bf7b78b69088a9b17c8445fdda085
-
SHA512
47be7f5260bcaa860bfec3072d8a6db0c5c69cc9cc31f79c0f1fc44baa849bbb7f35c93066022f40f0c4694198105b33cbc218c38150dfbe02da4532b1099d71
-
SSDEEP
6144:qb3pDH9HadMdX6jN2iVydIgckBqNEp+1w6PAgLcMvhlOO85kMC+vh7HMyx5g6VO:qlGMQg+yuaZMT4chlKqEp7HM25K
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
vidar
55
1718
https://t.me/truewallets
https://mas.to/@zara99
http://116.203.10.3:80
-
profile_id
1718
Targets
-
-
Target
file.exe
-
Size
359KB
-
MD5
a1c33d360b68460d9b42d30ba8eb0b66
-
SHA1
9a26e01b7330c77a2f15e39c0da564003841513a
-
SHA256
1bd4abc21125d116ca1b721d180e1c36dd0bf7b78b69088a9b17c8445fdda085
-
SHA512
47be7f5260bcaa860bfec3072d8a6db0c5c69cc9cc31f79c0f1fc44baa849bbb7f35c93066022f40f0c4694198105b33cbc218c38150dfbe02da4532b1099d71
-
SSDEEP
6144:qb3pDH9HadMdX6jN2iVydIgckBqNEp+1w6PAgLcMvhlOO85kMC+vh7HMyx5g6VO:qlGMQg+yuaZMT4chlKqEp7HM25K
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-