Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 06:32

General

  • Target

    38b34e3b4ebe93cf20eef8a50f10a2e9.exe

  • Size

    6.5MB

  • MD5

    df9611d635ed2c74f4674dd545ede566

  • SHA1

    c0e75614c2e0ea333ae1b35ebdc188c584aebd32

  • SHA256

    6b3b2aec308683a35d96f1e991c03ca07703590855e04735f5f0ccf0728eb840

  • SHA512

    82227b45d88cfe9b8316fa5660945b5175469a1af26e4944e3867797faf377ce6e660843cbc750b1c6b1af00c3b70de4ae9f30def3eb0405e26ac2cd2356bd11

  • SSDEEP

    196608:DhhUHn/OWz19WvhujZlxkf70yarD3kJQ:l+n/Ow9eeZTkfnGD3ka

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

1134

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

http://5.161.120.43:80

Attributes
  • profile_id

    1134

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38b34e3b4ebe93cf20eef8a50f10a2e9.exe
    "C:\Users\Admin\AppData\Local\Temp\38b34e3b4ebe93cf20eef8a50f10a2e9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3524-133-0x0000000000C80000-0x0000000000C81000-memory.dmp
    Filesize

    4KB

  • memory/3524-134-0x0000000002900000-0x0000000002901000-memory.dmp
    Filesize

    4KB

  • memory/3524-135-0x0000000002920000-0x0000000002921000-memory.dmp
    Filesize

    4KB

  • memory/3524-136-0x0000000002930000-0x0000000002931000-memory.dmp
    Filesize

    4KB

  • memory/3524-137-0x0000000002940000-0x0000000002941000-memory.dmp
    Filesize

    4KB

  • memory/3524-138-0x0000000002950000-0x0000000002951000-memory.dmp
    Filesize

    4KB

  • memory/3524-139-0x0000000002960000-0x0000000002961000-memory.dmp
    Filesize

    4KB

  • memory/3524-140-0x0000000000130000-0x00000000007BF000-memory.dmp
    Filesize

    6.6MB