Analysis
-
max time kernel
41s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-02-2023 11:51
Static task
static1
Behavioral task
behavioral1
Sample
6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe
-
Size
1.1MB
-
MD5
749d19c5b63ba2f68382316133b3bce9
-
SHA1
5b6073743e6dc49516452c6acd0a2a529fc865eb
-
SHA256
6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321
-
SHA512
155ae150d41ecdb97d99b66b9e1c9baed920095008c5ef23617edf2ba2b59b8663c449733f5166bb16c6b6be6fee20cce46971ad8eec8c3b5c3523b46e18e82e
-
SSDEEP
12288:+SqfVrWp0vjTTBS/ZchhSIFShxk+MkblmQGEOUIiC1LX9A9iJ8e3AhmL9N7Q9Bgm:zpuXBgZchhcRbvOUItL9NueIeuLP3
Malware Config
Extracted
Family
vidar
Version
2.2
Botnet
15
C2
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
Attributes
-
profile_id
15
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28 PID 1584 wrote to memory of 268 1584 6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe"C:\Users\Admin\AppData\Local\Temp\6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe"C:\Users\Admin\AppData\Local\Temp\6850b7d056a9bffa791dd47dc0f8251fc5cc72fd0d90eb7b3ffe5bbaf5cf9321.exe"2⤵PID:268
-