General
-
Target
50d576843a36ea0ed56d5ff525690a782db8a9e3
-
Size
602KB
-
Sample
230113-bgt4psgd2z
-
MD5
3eb2e4fc5a63f1148550e8ad8f55d56c
-
SHA1
50d576843a36ea0ed56d5ff525690a782db8a9e3
-
SHA256
9a2232a4a9ceef2c3fcfee0acca71d5717395aff8abd1b6b26aa3a5c266b3fae
-
SHA512
50029b544fb5b94f69d0739609e7aa3b320ae674e18a589430f953d6f0a935bb7a0d21753742f4729ad987fa3917816f4bbc8dbe6d10d01d0a7db84f260c2060
-
SSDEEP
12288:FkESTrfRL7qg5g+SQVSbEg7t3O3og3iN7f86LHut03:m7PvG+S77Yt3iN7fUW
Static task
static1
Behavioral task
behavioral1
Sample
50d576843a36ea0ed56d5ff525690a782db8a9e3.exe
Resource
win7-20221111-en
Malware Config
Extracted
vidar
2
255
https://t.me/tgdatapacks
https://steamcommunity.com/profiles/76561199469677637
-
profile_id
255
Extracted
laplas
45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Targets
-
-
Target
50d576843a36ea0ed56d5ff525690a782db8a9e3
-
Size
602KB
-
MD5
3eb2e4fc5a63f1148550e8ad8f55d56c
-
SHA1
50d576843a36ea0ed56d5ff525690a782db8a9e3
-
SHA256
9a2232a4a9ceef2c3fcfee0acca71d5717395aff8abd1b6b26aa3a5c266b3fae
-
SHA512
50029b544fb5b94f69d0739609e7aa3b320ae674e18a589430f953d6f0a935bb7a0d21753742f4729ad987fa3917816f4bbc8dbe6d10d01d0a7db84f260c2060
-
SSDEEP
12288:FkESTrfRL7qg5g+SQVSbEg7t3O3og3iN7f86LHut03:m7PvG+S77Yt3iN7fUW
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-