General
-
Target
f4974a20ba2cd22cb9069aac0d337136.exe
-
Size
805KB
-
Sample
230105-wrfdhscg35
-
MD5
f4974a20ba2cd22cb9069aac0d337136
-
SHA1
07a4fa031c12d8f902a77ce5c8b673112a27379d
-
SHA256
e4f7ecadb3b2aac68217ff1676cd124bd315f7c3b6c75bd10f5073bb3a8ff878
-
SHA512
ccf5c947421fa54d02ae81054b0d6f664661f5c2b031b567c73d7270eda74c729c6815105e554b0d1632051f73c71e01fe1bbe92183ab20f16d7d58e4860311d
-
SSDEEP
3072:+ahKyd2n31G5eV1sK8eU2jBoksuDi4no6LOFhF8T:+ahOPV
Static task
static1
Behavioral task
behavioral1
Sample
f4974a20ba2cd22cb9069aac0d337136.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4974a20ba2cd22cb9069aac0d337136.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
vidar
1.8
811
https://t.me/year2023start
https://steamcommunity.com/profiles/76561199467421923
-
profile_id
811
Targets
-
-
Target
f4974a20ba2cd22cb9069aac0d337136.exe
-
Size
805KB
-
MD5
f4974a20ba2cd22cb9069aac0d337136
-
SHA1
07a4fa031c12d8f902a77ce5c8b673112a27379d
-
SHA256
e4f7ecadb3b2aac68217ff1676cd124bd315f7c3b6c75bd10f5073bb3a8ff878
-
SHA512
ccf5c947421fa54d02ae81054b0d6f664661f5c2b031b567c73d7270eda74c729c6815105e554b0d1632051f73c71e01fe1bbe92183ab20f16d7d58e4860311d
-
SSDEEP
3072:+ahKyd2n31G5eV1sK8eU2jBoksuDi4no6LOFhF8T:+ahOPV
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-