General
-
Target
fdfdfdf.txt
-
Size
7KB
-
Sample
230401-zqlexsea91
-
MD5
e0e398ab9fc85af4782e59c9ebdb0aff
-
SHA1
528de232534f4fa431642154349e6c8814c67895
-
SHA256
edaefe4989655651df0e69e59db1023ae6c93077e847017aebb04722dcc79635
-
SHA512
74af44a1c3754af24cb26c191aa7d2ba3684ee6ef2454de8e177d715c3ac54681b401e026ae1928839e992be25d5412fb70a8255255c7141c48174f92a43e555
-
SSDEEP
12:8uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuY:X
Static task
static1
Behavioral task
behavioral1
Sample
fdfdfdf.txt
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.2
f5594a940041074375a00887e616a9d7
https://steamcommunity.com/profiles/76561199482806358
https://t.me/tabootalks
-
profile_id_v2
f5594a940041074375a00887e616a9d7
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79
Targets
-
-
Target
fdfdfdf.txt
-
Size
7KB
-
MD5
e0e398ab9fc85af4782e59c9ebdb0aff
-
SHA1
528de232534f4fa431642154349e6c8814c67895
-
SHA256
edaefe4989655651df0e69e59db1023ae6c93077e847017aebb04722dcc79635
-
SHA512
74af44a1c3754af24cb26c191aa7d2ba3684ee6ef2454de8e177d715c3ac54681b401e026ae1928839e992be25d5412fb70a8255255c7141c48174f92a43e555
-
SSDEEP
12:8uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuY:X
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-