General
-
Target
setup.exe
-
Size
326KB
-
Sample
230427-aglxnacf57
-
MD5
9fe0b462a779cff10d328e480332818b
-
SHA1
c31d10faa53773d17822ee0ad70acf0839bec3d1
-
SHA256
be04801e050f6b11b177a4febcd6daecbbfa6891c0fbc2e053638ff7c1f7cda0
-
SHA512
1df12fd4956f8bd70d430518410b1b4d89c1f8ec474d0ce9a92f93338beff776490d08434faa990ce01fc44a0de70e0576c976ec3d6ea8e072188e74e7248bf9
-
SSDEEP
6144:vdCM4ZD2dI9UtxTPRcvughcUF6Zxpm2XxdDt5CHx:vdCM4ZD2OATPRaugh+m2XxQH
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Malware Config
Extracted
vidar
3.5
2234cb18bdcd93ea6f4e5f1473025a81
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
2234cb18bdcd93ea6f4e5f1473025a81
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Extracted
laplas
http://89.23.97.128
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Targets
-
-
Target
setup.exe
-
Size
326KB
-
MD5
9fe0b462a779cff10d328e480332818b
-
SHA1
c31d10faa53773d17822ee0ad70acf0839bec3d1
-
SHA256
be04801e050f6b11b177a4febcd6daecbbfa6891c0fbc2e053638ff7c1f7cda0
-
SHA512
1df12fd4956f8bd70d430518410b1b4d89c1f8ec474d0ce9a92f93338beff776490d08434faa990ce01fc44a0de70e0576c976ec3d6ea8e072188e74e7248bf9
-
SSDEEP
6144:vdCM4ZD2dI9UtxTPRcvughcUF6Zxpm2XxdDt5CHx:vdCM4ZD2OATPRaugh+m2XxQH
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-