General
-
Target
88db66c3e3e6aeaf6dfe20fcbfe73b37241fdabe109d073b67578f9e90a8f844
-
Size
470KB
-
Sample
230420-fkx2zsff63
-
MD5
0bf020ba8782a3009ff7f60adb1c9e24
-
SHA1
61aa76e3f2d45b25c7809905ef2ebd5cacb3aeac
-
SHA256
88db66c3e3e6aeaf6dfe20fcbfe73b37241fdabe109d073b67578f9e90a8f844
-
SHA512
40ac199adae54187abefa40dc14bb2125a7d6823420178397bd3748a695272b505c15546603b6b3fcc1b8bb7bf46b3961545e9cf6a6ca729405eec34d7c4ab27
-
SSDEEP
12288:BpwQYnj3tM7cLLKw5hqToMq/7d5AOVkz5F+8hqb:BqQYR/Kw5YToMwrTM5g
Static task
static1
Behavioral task
behavioral1
Sample
88db66c3e3e6aeaf6dfe20fcbfe73b37241fdabe109d073b67578f9e90a8f844.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.4
e749025c61b2caca10aa829a9e1a65a1
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
e749025c61b2caca10aa829a9e1a65a1
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Targets
-
-
Target
88db66c3e3e6aeaf6dfe20fcbfe73b37241fdabe109d073b67578f9e90a8f844
-
Size
470KB
-
MD5
0bf020ba8782a3009ff7f60adb1c9e24
-
SHA1
61aa76e3f2d45b25c7809905ef2ebd5cacb3aeac
-
SHA256
88db66c3e3e6aeaf6dfe20fcbfe73b37241fdabe109d073b67578f9e90a8f844
-
SHA512
40ac199adae54187abefa40dc14bb2125a7d6823420178397bd3748a695272b505c15546603b6b3fcc1b8bb7bf46b3961545e9cf6a6ca729405eec34d7c4ab27
-
SSDEEP
12288:BpwQYnj3tM7cLLKw5hqToMq/7d5AOVkz5F+8hqb:BqQYR/Kw5YToMwrTM5g
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-