General
-
Target
de2e28817bcbcb22a47b811213b09dcd5e397228db4525ccf60a5377c1f3f6bd
-
Size
472KB
-
Sample
230415-trlt7aeg42
-
MD5
73f26ce32295efbd1e8b4e06ec520fe4
-
SHA1
bfe7b140805f23434c41a2166210fe48db2d5db8
-
SHA256
de2e28817bcbcb22a47b811213b09dcd5e397228db4525ccf60a5377c1f3f6bd
-
SHA512
6d43414d2531ec2f2a7e1621f7433dc3bb2a5c04d1fc8bb69dfcab083e891f473f4541d6e656c81724fd53eb87deb7293715ece0373e0824e98edf4a1be384c4
-
SSDEEP
12288:HZDPxCGZ8+l/114VMsi+d3q4C+C2V1RdZt4:HZ4G7t1OLqr+hV1Xz4
Static task
static1
Behavioral task
behavioral1
Sample
de2e28817bcbcb22a47b811213b09dcd5e397228db4525ccf60a5377c1f3f6bd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.4
e749025c61b2caca10aa829a9e1a65a1
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
e749025c61b2caca10aa829a9e1a65a1
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Targets
-
-
Target
de2e28817bcbcb22a47b811213b09dcd5e397228db4525ccf60a5377c1f3f6bd
-
Size
472KB
-
MD5
73f26ce32295efbd1e8b4e06ec520fe4
-
SHA1
bfe7b140805f23434c41a2166210fe48db2d5db8
-
SHA256
de2e28817bcbcb22a47b811213b09dcd5e397228db4525ccf60a5377c1f3f6bd
-
SHA512
6d43414d2531ec2f2a7e1621f7433dc3bb2a5c04d1fc8bb69dfcab083e891f473f4541d6e656c81724fd53eb87deb7293715ece0373e0824e98edf4a1be384c4
-
SSDEEP
12288:HZDPxCGZ8+l/114VMsi+d3q4C+C2V1RdZt4:HZ4G7t1OLqr+hV1Xz4
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-