General
-
Target
1708-388-0x0000000000400000-0x000000000046C000-memory.dmp
-
Size
432KB
-
Sample
230401-dbrshagh5t
-
MD5
bb1369cd9f8c2e3d261f4c2efb3a9117
-
SHA1
ce6ff9521f218b53c327e35ad3f63d8bb0f11b2f
-
SHA256
52dc9911cdc7c9a24df967a6c94c73bad75fb8b5ac7329bc6e026a5b925152a2
-
SHA512
ebfca2fa6604f5019080958218c10ba89f5dc7dde1503a3f3fd0868edc8a86354c1f1d54fdb938ca46568dc1cb0f0fe6e4790e7d1f89739cdf417a25d3f33dcd
-
SSDEEP
6144:7uQRHexuieV+IiVN3f9MY8DWGUQOElBtObJV9DKhoCYO/ItjCNhul:7uQRHexuieQ/EbYbxDKKM/ItjCK
Behavioral task
behavioral1
Sample
1708-388-0x0000000000400000-0x000000000046C000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1708-388-0x0000000000400000-0x000000000046C000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.2
5df88deb5dde677ba658b77ad5f60248
https://steamcommunity.com/profiles/76561199489580435
https://t.me/tabootalks
-
profile_id_v2
5df88deb5dde677ba658b77ad5f60248
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79
Targets
-
-
Target
1708-388-0x0000000000400000-0x000000000046C000-memory.dmp
-
Size
432KB
-
MD5
bb1369cd9f8c2e3d261f4c2efb3a9117
-
SHA1
ce6ff9521f218b53c327e35ad3f63d8bb0f11b2f
-
SHA256
52dc9911cdc7c9a24df967a6c94c73bad75fb8b5ac7329bc6e026a5b925152a2
-
SHA512
ebfca2fa6604f5019080958218c10ba89f5dc7dde1503a3f3fd0868edc8a86354c1f1d54fdb938ca46568dc1cb0f0fe6e4790e7d1f89739cdf417a25d3f33dcd
-
SSDEEP
6144:7uQRHexuieV+IiVN3f9MY8DWGUQOElBtObJV9DKhoCYO/ItjCNhul:7uQRHexuieQ/EbYbxDKKM/ItjCK
Score3/10 -