Analysis
-
max time kernel
301s -
max time network
348s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2023 20:52
Static task
static1
Behavioral task
behavioral1
Sample
bf19cbd2d5a7206baa3c258e86eb7a29.exe
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
General
-
Target
bf19cbd2d5a7206baa3c258e86eb7a29.exe
-
Size
379KB
-
MD5
bf19cbd2d5a7206baa3c258e86eb7a29
-
SHA1
226805290d2b81dc99d67371a4ed1a3056dc0d0a
-
SHA256
34807308101a60cec8e37bbc0d481d601031c1cec063fef32ede3e6d873b261d
-
SHA512
11bddec936c1b2be5af7f7db013036943067f1e16b77efc9bc99e71e6d19bbb83914ee224879fa999639a09d8272efc9436ce80640a7d1be26eef8f0e7dc56dc
-
SSDEEP
6144:ftB7zWL72yiJVNZJggT+5JPWGJprlde2+yQrYSHuxGSlJZ9tzrSA3K:FB7zWf2yWNZis+5gGJpre/yCYLZ9P3K
Malware Config
Extracted
Family
vidar
Version
2
Botnet
14
C2
https://t.me/tgdatapacks
https://steamcommunity.com/profiles/76561199469677637
Attributes
-
profile_id
14
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3384-133-0x00000000006EE000-0x000000000071B000-memory.dmpFilesize
180KB
-
memory/3384-134-0x00000000021B0000-0x00000000021FC000-memory.dmpFilesize
304KB
-
memory/3384-135-0x00000000006EE000-0x000000000071B000-memory.dmpFilesize
180KB
-
memory/3384-136-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/3384-137-0x00000000021B0000-0x00000000021FC000-memory.dmpFilesize
304KB
-
memory/3384-138-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/3384-139-0x0000000050B30000-0x0000000050BC2000-memory.dmpFilesize
584KB