Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/12/2022, 14:17
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
4.3MB
-
MD5
3555fd0b048f8e00c391c7d350e149c2
-
SHA1
90ac9e40cd0901f20b819d9c6d4f117ddc4ecdf5
-
SHA256
a8f389513961a29eb1ecf1edf0fb8a3d199b7650bc513cfede4e37dbde62b318
-
SHA512
e9053df776681c6f5f98745b3648f725c7ff7576e885232ea7287aa96a292b5695ef902de7256fe40bc5e5d9c86163e5c51c2fd5ac4a487c2bc417bd792aeb07
-
SSDEEP
98304:ME4qy2oXaP4EYhw3g629ufusBvXLRSFs9EA:MV2oFDw8BwXLRgA
Malware Config
Extracted
Family
vidar
Version
1.7
Botnet
588
C2
https://t.me/robloxblackl
https://steamcommunity.com/profiles/76561199458928097
Attributes
-
profile_id
588
Signatures
-
resource yara_rule behavioral1/memory/1424-54-0x0000000000270000-0x0000000000977000-memory.dmp vmprotect behavioral1/memory/1424-57-0x0000000000270000-0x0000000000977000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 file.exe 1424 file.exe