General
-
Target
test.exe
-
Size
292KB
-
Sample
221123-p1kk9scg28
-
MD5
4b2270c3dea2e8d9725933481467c5ba
-
SHA1
646da48d74d878550bde45517324c79b1782bedd
-
SHA256
e34019bf53ec496c426d3697dffeb266143007344ca77519bcabdbc28aecbade
-
SHA512
fa7d50f8f0380e891a1a8bb45ab96ce9dd72c97b1d504c91c1cc68276e136637ca448da77970d422639c04b6c9765061d9c498945cc0d03213652a6eb2f54e48
-
SSDEEP
6144:/BzPF1ACC2Ki7cUoSSwu5To9QsMlNAwMTl7p0zeXUfzWNCoL:xPFh7cUoSSwu5To9QRNAwMTlNEe8CL
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20221111-en
Malware Config
Extracted
vidar
55.7
1375
https://t.me/deadftx
https://www.tiktok.com/@user6068972597711
-
profile_id
1375
Targets
-
-
Target
test.exe
-
Size
292KB
-
MD5
4b2270c3dea2e8d9725933481467c5ba
-
SHA1
646da48d74d878550bde45517324c79b1782bedd
-
SHA256
e34019bf53ec496c426d3697dffeb266143007344ca77519bcabdbc28aecbade
-
SHA512
fa7d50f8f0380e891a1a8bb45ab96ce9dd72c97b1d504c91c1cc68276e136637ca448da77970d422639c04b6c9765061d9c498945cc0d03213652a6eb2f54e48
-
SSDEEP
6144:/BzPF1ACC2Ki7cUoSSwu5To9QsMlNAwMTl7p0zeXUfzWNCoL:xPFh7cUoSSwu5To9QRNAwMTlNEe8CL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-