Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:23
Behavioral task
behavioral1
Sample
38b34e3b4ebe93cf20eef8a50f10a2e9.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
38b34e3b4ebe93cf20eef8a50f10a2e9.exe
-
Size
336.0MB
-
MD5
38b34e3b4ebe93cf20eef8a50f10a2e9
-
SHA1
d1b2499370d08c32335e92029101754c1547f17b
-
SHA256
9cfd007e31798c353c6969e93034a842ec9959bc0a02b1cd26278fb51e6d8397
-
SHA512
78af37b92803d19a4969c47178842603c98f432a9a5968e3cd73832de09c321f8dd4b954d58d38644eff00df6ed68355f81b6adf1952093092dc35151cb09fb5
-
SSDEEP
196608:DhhUHn/OWz19WvhujZlxkf70yarD3kJQ:l+n/Ow9eeZTkfnGD3ka
Malware Config
Extracted
Family
vidar
Version
54.9
Botnet
1134
C2
https://t.me/larsenup
https://ioc.exchange/@zebra54
http://5.161.120.43:80
Attributes
-
profile_id
1134
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
38b34e3b4ebe93cf20eef8a50f10a2e9.exepid process 216 38b34e3b4ebe93cf20eef8a50f10a2e9.exe 216 38b34e3b4ebe93cf20eef8a50f10a2e9.exe 216 38b34e3b4ebe93cf20eef8a50f10a2e9.exe 216 38b34e3b4ebe93cf20eef8a50f10a2e9.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/216-133-0x0000000001320000-0x0000000001321000-memory.dmpFilesize
4KB
-
memory/216-134-0x0000000001330000-0x0000000001331000-memory.dmpFilesize
4KB
-
memory/216-135-0x0000000002E30000-0x0000000002E31000-memory.dmpFilesize
4KB
-
memory/216-136-0x0000000002E40000-0x0000000002E41000-memory.dmpFilesize
4KB
-
memory/216-137-0x0000000002E50000-0x0000000002E51000-memory.dmpFilesize
4KB
-
memory/216-138-0x0000000002E60000-0x0000000002E61000-memory.dmpFilesize
4KB
-
memory/216-139-0x0000000002E70000-0x0000000002E71000-memory.dmpFilesize
4KB
-
memory/216-140-0x0000000000B00000-0x000000000118F000-memory.dmpFilesize
6.6MB