General
-
Target
tmp
-
Size
13.3MB
-
Sample
230216-vbmbfsaf63
-
MD5
c8c0bd9fb6afbc25324d767ff3f83b05
-
SHA1
8399edd9967a9b0a909e98f0ce311ebfa3402ea0
-
SHA256
505d85e3f2cc036bd585825a9bf3fd03a90a849d76dc29e842a1b3725d0b86ce
-
SHA512
03e28fef1d830cada115f49d5ed6b85199df3fcd953ca37443e96c2538ba37fc9c3b766f14447aa114fa16b2e9177db741e5b209b0e2479f3b672a0569a70792
-
SSDEEP
196608:cu3r9+J1zWgjWfVKyLsVXVe7Z2LXOVseTDCOBv9CpsN67lt4xAttU0FEFNPzHUdO:5MJ1zWgCcYYh+VsXOR9CpsAt4xUwNr0Q
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Malware Config
Extracted
vidar
2.5
645
-
profile_id
645
Targets
-
-
Target
tmp
-
Size
13.3MB
-
MD5
c8c0bd9fb6afbc25324d767ff3f83b05
-
SHA1
8399edd9967a9b0a909e98f0ce311ebfa3402ea0
-
SHA256
505d85e3f2cc036bd585825a9bf3fd03a90a849d76dc29e842a1b3725d0b86ce
-
SHA512
03e28fef1d830cada115f49d5ed6b85199df3fcd953ca37443e96c2538ba37fc9c3b766f14447aa114fa16b2e9177db741e5b209b0e2479f3b672a0569a70792
-
SSDEEP
196608:cu3r9+J1zWgjWfVKyLsVXVe7Z2LXOVseTDCOBv9CpsN67lt4xAttU0FEFNPzHUdO:5MJ1zWgCcYYh+VsXOR9CpsAt4xUwNr0Q
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-