General
-
Target
f0e81469d83461dfb79b910bcc93a5aef752d0dc222a8722fbd9cf30d76ffca6
-
Size
1.4MB
-
Sample
230415-s5k95sef24
-
MD5
a8256a75141215f34166856b211cf6c8
-
SHA1
9acb224bd572629a484fce5fc02a3135e064b804
-
SHA256
f0e81469d83461dfb79b910bcc93a5aef752d0dc222a8722fbd9cf30d76ffca6
-
SHA512
6dcdcdc5ebea042f1fcb4778570cd637620f6e91393417793d62da5383567ffc5d678efc95ac4832a58bad0f397f5a5ce3fa0127b3a4335f0511d6082c0375ab
-
SSDEEP
12288:7Wvp2K6+yhbYfTbdAZ7CcrtoI6ysrmmsI8Z6FJwPpq:7PKK0TbdAZ7CXI6rrmVZ6FJiq
Static task
static1
Behavioral task
behavioral1
Sample
f0e81469d83461dfb79b910bcc93a5aef752d0dc222a8722fbd9cf30d76ffca6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.4
a18680a5fbabb05c80ce4c10eab19607
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
a18680a5fbabb05c80ce4c10eab19607
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Targets
-
-
Target
f0e81469d83461dfb79b910bcc93a5aef752d0dc222a8722fbd9cf30d76ffca6
-
Size
1.4MB
-
MD5
a8256a75141215f34166856b211cf6c8
-
SHA1
9acb224bd572629a484fce5fc02a3135e064b804
-
SHA256
f0e81469d83461dfb79b910bcc93a5aef752d0dc222a8722fbd9cf30d76ffca6
-
SHA512
6dcdcdc5ebea042f1fcb4778570cd637620f6e91393417793d62da5383567ffc5d678efc95ac4832a58bad0f397f5a5ce3fa0127b3a4335f0511d6082c0375ab
-
SSDEEP
12288:7Wvp2K6+yhbYfTbdAZ7CcrtoI6ysrmmsI8Z6FJwPpq:7PKK0TbdAZ7CXI6rrmVZ6FJiq
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-