General
-
Target
ac4bd1987b6a72732c2590c7a44f63f63bfa7617ef7f86d8975175b67db4fb30
-
Size
348KB
-
Sample
221028-ld6nfaffcj
-
MD5
234c2c0d5948f2c2ae0dce965ccc6115
-
SHA1
6d32e6ad4181fe051bac11b220583baeed5dba68
-
SHA256
ac4bd1987b6a72732c2590c7a44f63f63bfa7617ef7f86d8975175b67db4fb30
-
SHA512
57b7050a1f52c1d3c1f227472d774e3063e0974f8527916cf7122641db820829874c21d0f5d4c6693e0984d0500ec799a1563cf85328288d19af0e1c80c39046
-
SSDEEP
6144:0xvH4L+iUvjiUrN4at1bpPt1msariYfsrsMNjKa8XEp:0xvH46pvtpnt1dusarHfssnJEp
Static task
static1
Malware Config
Extracted
vidar
55.2
1707
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
1707
Targets
-
-
Target
ac4bd1987b6a72732c2590c7a44f63f63bfa7617ef7f86d8975175b67db4fb30
-
Size
348KB
-
MD5
234c2c0d5948f2c2ae0dce965ccc6115
-
SHA1
6d32e6ad4181fe051bac11b220583baeed5dba68
-
SHA256
ac4bd1987b6a72732c2590c7a44f63f63bfa7617ef7f86d8975175b67db4fb30
-
SHA512
57b7050a1f52c1d3c1f227472d774e3063e0974f8527916cf7122641db820829874c21d0f5d4c6693e0984d0500ec799a1563cf85328288d19af0e1c80c39046
-
SSDEEP
6144:0xvH4L+iUvjiUrN4at1bpPt1msariYfsrsMNjKa8XEp:0xvH46pvtpnt1dusarHfssnJEp
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-