General
-
Target
5cab66a2c2c7d12b98adc4330a095eef4f4204968d82e7a2c6efc70df79ac45b
-
Size
308KB
-
Sample
230410-sj5rnaeb66
-
MD5
1083b85531ffb02d7d2b851ea64d869c
-
SHA1
c414ff31e27e4bbe384bc370bd593403d55fdc51
-
SHA256
5cab66a2c2c7d12b98adc4330a095eef4f4204968d82e7a2c6efc70df79ac45b
-
SHA512
aa579ca0c21757fabe347ccb6e96ef6371deb6b083484e85dd3f24cddf79bdbfe560422379ef65015a660a0e8775f92216b010767849dc1e4fda64c10c9055a9
-
SSDEEP
6144:O28oqhvbwcp0xkM9C31zkGrtdEBntV9JST/0PhpQGO008b:sZhvR48lzJpdEdtVHSDQh6gb
Static task
static1
Behavioral task
behavioral1
Sample
5cab66a2c2c7d12b98adc4330a095eef4f4204968d82e7a2c6efc70df79ac45b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.4
e749025c61b2caca10aa829a9e1a65a1
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
e749025c61b2caca10aa829a9e1a65a1
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Targets
-
-
Target
5cab66a2c2c7d12b98adc4330a095eef4f4204968d82e7a2c6efc70df79ac45b
-
Size
308KB
-
MD5
1083b85531ffb02d7d2b851ea64d869c
-
SHA1
c414ff31e27e4bbe384bc370bd593403d55fdc51
-
SHA256
5cab66a2c2c7d12b98adc4330a095eef4f4204968d82e7a2c6efc70df79ac45b
-
SHA512
aa579ca0c21757fabe347ccb6e96ef6371deb6b083484e85dd3f24cddf79bdbfe560422379ef65015a660a0e8775f92216b010767849dc1e4fda64c10c9055a9
-
SSDEEP
6144:O28oqhvbwcp0xkM9C31zkGrtdEBntV9JST/0PhpQGO008b:sZhvR48lzJpdEdtVHSDQh6gb
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-