General
-
Target
75fcb5d94124e7f3d099d6ac35a1af401bd52d68d6480a231171ae3b4833688a
-
Size
2.1MB
-
Sample
230108-x219eahh5y
-
MD5
e52f5370a68e1ee7b5f24b708924025b
-
SHA1
bf920f1fe420f1c8dc8dba7112f1b57bf0d6dfb7
-
SHA256
75fcb5d94124e7f3d099d6ac35a1af401bd52d68d6480a231171ae3b4833688a
-
SHA512
7a2245652656888ec46a4a081aaa52ca86723b6d251059882b756fd0b7c8b0a576ad29c0b46fe3706a40d680c3940f3cadbd3716de98066b64b0b904fb624286
-
SSDEEP
49152:B61lu6RZizQwhPuMaWFVCInTda0xW7hl8A:gG6KQwh2Mao9w+W7DZ
Static task
static1
Behavioral task
behavioral1
Sample
75fcb5d94124e7f3d099d6ac35a1af401bd52d68d6480a231171ae3b4833688a.exe
Resource
win10-20220812-en
Malware Config
Extracted
vidar
1.8
641
https://t.me/year2023start
https://steamcommunity.com/profiles/76561199467421923
-
profile_id
641
Targets
-
-
Target
75fcb5d94124e7f3d099d6ac35a1af401bd52d68d6480a231171ae3b4833688a
-
Size
2.1MB
-
MD5
e52f5370a68e1ee7b5f24b708924025b
-
SHA1
bf920f1fe420f1c8dc8dba7112f1b57bf0d6dfb7
-
SHA256
75fcb5d94124e7f3d099d6ac35a1af401bd52d68d6480a231171ae3b4833688a
-
SHA512
7a2245652656888ec46a4a081aaa52ca86723b6d251059882b756fd0b7c8b0a576ad29c0b46fe3706a40d680c3940f3cadbd3716de98066b64b0b904fb624286
-
SSDEEP
49152:B61lu6RZizQwhPuMaWFVCInTda0xW7hl8A:gG6KQwh2Mao9w+W7DZ
Score10/10-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-