General
-
Target
file.exe
-
Size
392KB
-
Sample
221227-kep7eahg3z
-
MD5
db99a2e613fc448909216c84a3ddb142
-
SHA1
447ba156daaf36b17ecda5db7a4552c0faf58443
-
SHA256
20bc27ce3899bd504c6da266020188f0b8f33d5e582926c533e9543ed22e82f7
-
SHA512
e47d9539deb84befa86d1dde914ff2b84aa7b8fd0cc156ef1e533a9f6f3d10e82df1cb6dccc219c953e02eb65ea400c896929f0104e625d1d1f2c9fc2da45bf6
-
SSDEEP
12288:hmx6un2Gn+fw2dgXAB+LBS58xaxDPyrbA:Cn2Gn+fiXKMB08xaNPyrc
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
vidar
1.7
24
https://t.me/robloxblackl
https://steamcommunity.com/profiles/76561199458928097
-
profile_id
24
Targets
-
-
Target
file.exe
-
Size
392KB
-
MD5
db99a2e613fc448909216c84a3ddb142
-
SHA1
447ba156daaf36b17ecda5db7a4552c0faf58443
-
SHA256
20bc27ce3899bd504c6da266020188f0b8f33d5e582926c533e9543ed22e82f7
-
SHA512
e47d9539deb84befa86d1dde914ff2b84aa7b8fd0cc156ef1e533a9f6f3d10e82df1cb6dccc219c953e02eb65ea400c896929f0104e625d1d1f2c9fc2da45bf6
-
SSDEEP
12288:hmx6un2Gn+fw2dgXAB+LBS58xaxDPyrbA:Cn2Gn+fiXKMB08xaNPyrc
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-