General
-
Target
bank_statement.scr
-
Size
25MB
-
Sample
230602-15z3asfb3w
-
MD5
dedd66f7cdc48224fb7fcbc795f69bfd
-
SHA1
00ab7277c89b9f0608f00997b219881a92e36888
-
SHA256
b11e85d0eed98a012f018c818f72a0bc0d0521ea132a45a58f5de92da924c225
-
SHA512
4ea3119416c786ec9667eaa499b3af40d196f4ecf2ffaac5e5b78ccbaba34ab867e302a10fc7964dc95284fafcffdeca3361886dffdc2c2ba2bf2fb5e664b8c3
-
SSDEEP
393216:iEbUSKA4SNAwLpQfgVehx8oyLZ8Ae0sCK9UCUQkiWajOHkzhSbfA:7bUXA4Vv9eoyt8Ae07K2CUdiWajOHe
Static task
static1
Behavioral task
behavioral1
Sample
bank_statement.scr
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bank_statement.scr
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
4.1
850dc0663d2676536f88b82b3382fcb4
https://steamcommunity.com/profiles/76561199510444991
https://t.me/task4manager
-
profile_id_v2
850dc0663d2676536f88b82b3382fcb4
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Edg/112.0.1722.34
Targets
-
-
Target
bank_statement.scr
-
Size
25MB
-
MD5
dedd66f7cdc48224fb7fcbc795f69bfd
-
SHA1
00ab7277c89b9f0608f00997b219881a92e36888
-
SHA256
b11e85d0eed98a012f018c818f72a0bc0d0521ea132a45a58f5de92da924c225
-
SHA512
4ea3119416c786ec9667eaa499b3af40d196f4ecf2ffaac5e5b78ccbaba34ab867e302a10fc7964dc95284fafcffdeca3361886dffdc2c2ba2bf2fb5e664b8c3
-
SSDEEP
393216:iEbUSKA4SNAwLpQfgVehx8oyLZ8Ae0sCK9UCUQkiWajOHkzhSbfA:7bUXA4Vv9eoyt8Ae07K2CUdiWajOHe
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-