General
-
Target
file.exe
-
Size
2.2MB
-
Sample
230423-nfezlsda52
-
MD5
e3af7d1d0cf8fdb64fd1325c5bdee3ac
-
SHA1
9992ef93cf63ca7b2dbf4f53e6e7d3da523c0607
-
SHA256
fd5e477a5ef24773b8ed6e2acce77583e557a7def1eaf3ac6e51b71e4d599a65
-
SHA512
a2b139c9ddaec1d68a8650ed42c7639d72e3cf7755a04a4ddabc49164898282c595724f39cb61727058d16e8a4ea263364b625dcc0ba8dd5b32459715e9d1e76
-
SSDEEP
24576:m36P4vcvVN9gMWsvvS3OcZkQVj2hpyMkyj7NHlKaOKdlsBT5Q6S:m3d0tN6GS3bkQOMvynKaIe6S
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.5
1ba4b1695fdd1c995863750c0e6924af
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
1ba4b1695fdd1c995863750c0e6924af
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Targets
-
-
Target
file.exe
-
Size
2.2MB
-
MD5
e3af7d1d0cf8fdb64fd1325c5bdee3ac
-
SHA1
9992ef93cf63ca7b2dbf4f53e6e7d3da523c0607
-
SHA256
fd5e477a5ef24773b8ed6e2acce77583e557a7def1eaf3ac6e51b71e4d599a65
-
SHA512
a2b139c9ddaec1d68a8650ed42c7639d72e3cf7755a04a4ddabc49164898282c595724f39cb61727058d16e8a4ea263364b625dcc0ba8dd5b32459715e9d1e76
-
SSDEEP
24576:m36P4vcvVN9gMWsvvS3OcZkQVj2hpyMkyj7NHlKaOKdlsBT5Q6S:m3d0tN6GS3bkQOMvynKaIe6S
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-