General
-
Target
Date2023.exe
-
Size
1024KB
-
Sample
230326-st63gaah71
-
MD5
f7fd4791be2e2624b7fbb1d91ab2f539
-
SHA1
5e293bd82fc478a0891a092e02a7576d6a9799d9
-
SHA256
be82beca4c46e17fb1d4e7f23cf028f61b0d6e64d39146f31f1e7072ecf95fbe
-
SHA512
340d18119fe408976e06e78ab8fa44c900981b25025389e6da674d662945986456d6ed98ffc7a478ff9583b147cb77a4df339e6e4b9734952c69693e53e20882
-
SSDEEP
6144:7GZnGSyQWFr8FG6d68UeCVMlVTgjwAaTJVM0ASpk4hHsbPZ0kuydk3CKxh4:aXy7YKxeCVgxJA0ASp2tA
Static task
static1
Behavioral task
behavioral1
Sample
Date2023.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Date2023.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
vidar
3
e37abeff0df24a473dacaf8467d6fa48
https://t.me/zaskullz
https://steamcommunity.com/profiles/76561199486572327
http://135.181.87.234:80
-
profile_id_v2
e37abeff0df24a473dacaf8467d6fa48
Targets
-
-
Target
Date2023.exe
-
Size
1024KB
-
MD5
f7fd4791be2e2624b7fbb1d91ab2f539
-
SHA1
5e293bd82fc478a0891a092e02a7576d6a9799d9
-
SHA256
be82beca4c46e17fb1d4e7f23cf028f61b0d6e64d39146f31f1e7072ecf95fbe
-
SHA512
340d18119fe408976e06e78ab8fa44c900981b25025389e6da674d662945986456d6ed98ffc7a478ff9583b147cb77a4df339e6e4b9734952c69693e53e20882
-
SSDEEP
6144:7GZnGSyQWFr8FG6d68UeCVMlVTgjwAaTJVM0ASpk4hHsbPZ0kuydk3CKxh4:aXy7YKxeCVgxJA0ASp2tA
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-