Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:32
Behavioral task
behavioral1
Sample
38b34e3b4ebe93cf20eef8a50f10a2e9.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
38b34e3b4ebe93cf20eef8a50f10a2e9.exe
-
Size
6.5MB
-
MD5
df9611d635ed2c74f4674dd545ede566
-
SHA1
c0e75614c2e0ea333ae1b35ebdc188c584aebd32
-
SHA256
6b3b2aec308683a35d96f1e991c03ca07703590855e04735f5f0ccf0728eb840
-
SHA512
82227b45d88cfe9b8316fa5660945b5175469a1af26e4944e3867797faf377ce6e660843cbc750b1c6b1af00c3b70de4ae9f30def3eb0405e26ac2cd2356bd11
-
SSDEEP
196608:DhhUHn/OWz19WvhujZlxkf70yarD3kJQ:l+n/Ow9eeZTkfnGD3ka
Malware Config
Extracted
Family
vidar
Version
54.9
Botnet
1134
C2
https://t.me/larsenup
https://ioc.exchange/@zebra54
http://5.161.120.43:80
Attributes
-
profile_id
1134
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
38b34e3b4ebe93cf20eef8a50f10a2e9.exepid process 3524 38b34e3b4ebe93cf20eef8a50f10a2e9.exe 3524 38b34e3b4ebe93cf20eef8a50f10a2e9.exe 3524 38b34e3b4ebe93cf20eef8a50f10a2e9.exe 3524 38b34e3b4ebe93cf20eef8a50f10a2e9.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3524-133-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/3524-134-0x0000000002900000-0x0000000002901000-memory.dmpFilesize
4KB
-
memory/3524-135-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/3524-136-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/3524-137-0x0000000002940000-0x0000000002941000-memory.dmpFilesize
4KB
-
memory/3524-138-0x0000000002950000-0x0000000002951000-memory.dmpFilesize
4KB
-
memory/3524-139-0x0000000002960000-0x0000000002961000-memory.dmpFilesize
4KB
-
memory/3524-140-0x0000000000130000-0x00000000007BF000-memory.dmpFilesize
6.6MB