General
-
Target
file.exe
-
Size
2.7MB
-
Sample
230209-jvej6sbb78
-
MD5
d7d08069ca5131d2f153a3a9b60455ff
-
SHA1
4655fd1d0ab47cd046a8043ed8c3dc2a87c0d5a4
-
SHA256
44f6100a2d95f01fb7e692367928f9df629c556680bc74fe45011482184c8b61
-
SHA512
fb6e0aabc699097c4fad820ece0ad9d0ab14d319b18e214e2ce753b7b8c6a6e1574b9fffc7b9bc3afb2935ea0d29fb67bca628707836d937355ba0dcfe78965a
-
SSDEEP
49152:HCSHvx8vQiFUYisfslgff2KWF+xdguj67gOJLiQiHfsdbpB+oYa1+e:HCSHZy/UY1klTzF6dpXOgQi/a7+Ne
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Extracted
vidar
2.4
589
-
profile_id
589
Targets
-
-
Target
file.exe
-
Size
2.7MB
-
MD5
d7d08069ca5131d2f153a3a9b60455ff
-
SHA1
4655fd1d0ab47cd046a8043ed8c3dc2a87c0d5a4
-
SHA256
44f6100a2d95f01fb7e692367928f9df629c556680bc74fe45011482184c8b61
-
SHA512
fb6e0aabc699097c4fad820ece0ad9d0ab14d319b18e214e2ce753b7b8c6a6e1574b9fffc7b9bc3afb2935ea0d29fb67bca628707836d937355ba0dcfe78965a
-
SSDEEP
49152:HCSHvx8vQiFUYisfslgff2KWF+xdguj67gOJLiQiHfsdbpB+oYa1+e:HCSHZy/UY1klTzF6dpXOgQi/a7+Ne
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-