General
-
Target
a6bfac7006b2abd59450fbb255f7012a542095cc7367db0e0100c33e0a62c9e7
-
Size
2.8MB
-
Sample
221101-mqnh3abhdp
-
MD5
584f061ba8fe5d0eddcf3b68146763e2
-
SHA1
b60461bd014a2105398bcdd18a47c0befce48dc0
-
SHA256
a6bfac7006b2abd59450fbb255f7012a542095cc7367db0e0100c33e0a62c9e7
-
SHA512
f451e66f76543d9621b33099ecca31f6e201bb1bdf6009596316f7b32a5fa3bf8f7408d4b2e2d8bd4f2eae93b3b9295c97ae3fcaef7314b8c39ac4c641c7212b
-
SSDEEP
49152:78hmk3ryQy9TN/bYhM1Z/ZAkzdzYFwLeUeuXl3Q:78hmk3ryQolryFwLeJT
Static task
static1
Behavioral task
behavioral1
Sample
a6bfac7006b2abd59450fbb255f7012a542095cc7367db0e0100c33e0a62c9e7.exe
Resource
win7-20220812-en
Malware Config
Extracted
vidar
55.1
1375
https://t.me/tg_privatetalk
https://nerdculture.de/@yixehi33
http://195.201.252.190:80
-
profile_id
1375
Targets
-
-
Target
a6bfac7006b2abd59450fbb255f7012a542095cc7367db0e0100c33e0a62c9e7
-
Size
2.8MB
-
MD5
584f061ba8fe5d0eddcf3b68146763e2
-
SHA1
b60461bd014a2105398bcdd18a47c0befce48dc0
-
SHA256
a6bfac7006b2abd59450fbb255f7012a542095cc7367db0e0100c33e0a62c9e7
-
SHA512
f451e66f76543d9621b33099ecca31f6e201bb1bdf6009596316f7b32a5fa3bf8f7408d4b2e2d8bd4f2eae93b3b9295c97ae3fcaef7314b8c39ac4c641c7212b
-
SSDEEP
49152:78hmk3ryQy9TN/bYhM1Z/ZAkzdzYFwLeUeuXl3Q:78hmk3ryQolryFwLeJT
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-