General
-
Target
5717f541d1bf19cb4f6171bdb4cfacfc2353e75b2de4fc8ddf0524e9a9a30a88
-
Size
470KB
-
Sample
230415-h1vmxaeh6x
-
MD5
05bcb84b20bb1b13632055eb760c7bb5
-
SHA1
59693f5f244b6a548edc6d61e04421e06b8afc3d
-
SHA256
5717f541d1bf19cb4f6171bdb4cfacfc2353e75b2de4fc8ddf0524e9a9a30a88
-
SHA512
5fb652bcc0bc99931424c71e45b93db41c11b7f16dfbb629a4e1036f0dc7d5e2f6bff2d4d6311719c0c3172f3dbeda546252acf583198b7198756eed8bd993eb
-
SSDEEP
6144:hcnt6/KEgNkxeG/pOAY1UerJVQTBS8D3HhREBNn/LC93WaGhxUrKTi:hcs/TwkxeG/pnDeVatSKyNn/LIsuN
Static task
static1
Behavioral task
behavioral1
Sample
5717f541d1bf19cb4f6171bdb4cfacfc2353e75b2de4fc8ddf0524e9a9a30a88.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.4
e749025c61b2caca10aa829a9e1a65a1
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
e749025c61b2caca10aa829a9e1a65a1
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Targets
-
-
Target
5717f541d1bf19cb4f6171bdb4cfacfc2353e75b2de4fc8ddf0524e9a9a30a88
-
Size
470KB
-
MD5
05bcb84b20bb1b13632055eb760c7bb5
-
SHA1
59693f5f244b6a548edc6d61e04421e06b8afc3d
-
SHA256
5717f541d1bf19cb4f6171bdb4cfacfc2353e75b2de4fc8ddf0524e9a9a30a88
-
SHA512
5fb652bcc0bc99931424c71e45b93db41c11b7f16dfbb629a4e1036f0dc7d5e2f6bff2d4d6311719c0c3172f3dbeda546252acf583198b7198756eed8bd993eb
-
SSDEEP
6144:hcnt6/KEgNkxeG/pOAY1UerJVQTBS8D3HhREBNn/LC93WaGhxUrKTi:hcs/TwkxeG/pnDeVatSKyNn/LIsuN
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-