General
-
Target
4f4236a00072d3b2e9688c57aef204295315e1e56a53c134e44d037e602a1f23
-
Size
324KB
-
Sample
230104-vvsycacd3x
-
MD5
c94ea4e7afee3726d5810ec1a69a52ec
-
SHA1
50c133f9382de69fcd14143c17fbd216c5566ddc
-
SHA256
5fd7779e9ad398e9fc18ad65ee71d5b1d5de8671a1f9fc382f31fc520b05aabe
-
SHA512
d6bac77bc3564a78cf167ea8aa9992d2814b972a3c55030e9529640bede054addb5e7f869c4c11cdf62bf8e6ebe853d8ac86c5724a94788d7f7a19e8f8273a4f
-
SSDEEP
6144:pS9jlhoas5ZRmDhjb+3QU7lCu9hyvsICwsYK9hx41uh2pi8Ba:pmjlhb8/obilP9hGYxrdZ
Static task
static1
Behavioral task
behavioral1
Sample
4f4236a00072d3b2e9688c57aef204295315e1e56a53c134e44d037e602a1f23.exe
Resource
win7-20221111-en
Malware Config
Extracted
vidar
1.8
24
https://t.me/year2023start
https://steamcommunity.com/profiles/76561199467421923
-
profile_id
24
Targets
-
-
Target
4f4236a00072d3b2e9688c57aef204295315e1e56a53c134e44d037e602a1f23
-
Size
460KB
-
MD5
dd9b261370d38e19c041e529ce3c674b
-
SHA1
747dd0c3b31ff50fc0b0fc0ce2a269426e81d2c0
-
SHA256
4f4236a00072d3b2e9688c57aef204295315e1e56a53c134e44d037e602a1f23
-
SHA512
6171896b75be237d9d85c1099d665ad516fcd7bee560bdf19b489f86a994660b61977fc46b17b27ea6df50003573e7aed9be4d67de741bfcaffdbaa1fed88930
-
SSDEEP
6144:dVNdLwz3ztcOqMvJGs5ZRmDhjb+3QU7lsu9hyvsIg5oxupmL/7FgrVjT:Hf0TzFG8/obilx9h8IoxupmL/Z
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-