General
-
Target
file.exe
-
Size
640KB
-
Sample
230611-r5vm5saa2y
-
MD5
883f31e2b928f6d5a7123dcd84d696c6
-
SHA1
d3077361c775db9741247331ab1f1586110dbe18
-
SHA256
e779097dea4435849f4c626ecd943bbfed6c74dbf01d138613c8490708e87c62
-
SHA512
bc89064739fa8cc0138785aa1cd4c95e2358b571b6e939fa6a09356ba4c3ccfe613068176662b1e1740c159c8c25e4b1fde1c21657e40062703cfea198dffba7
-
SSDEEP
12288:iLAQrnTCvlXfUaks2peBR3zfftaoKxh5/2xeHJyJlrDF64fzBKGyEh4hoABv:vcSlXfUaks2peBRjfM5l2xaEbh64rBDs
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
4.2
98d0d34b4e35131252d3d615526218ea
https://steamcommunity.com/profiles/76561199511129510
https://t.me/rechnungsbetrag
-
profile_id_v2
98d0d34b4e35131252d3d615526218ea
-
user_agent
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.38 Safari/537.36 Brave/75
Targets
-
-
Target
file.exe
-
Size
640KB
-
MD5
883f31e2b928f6d5a7123dcd84d696c6
-
SHA1
d3077361c775db9741247331ab1f1586110dbe18
-
SHA256
e779097dea4435849f4c626ecd943bbfed6c74dbf01d138613c8490708e87c62
-
SHA512
bc89064739fa8cc0138785aa1cd4c95e2358b571b6e939fa6a09356ba4c3ccfe613068176662b1e1740c159c8c25e4b1fde1c21657e40062703cfea198dffba7
-
SSDEEP
12288:iLAQrnTCvlXfUaks2peBR3zfftaoKxh5/2xeHJyJlrDF64fzBKGyEh4hoABv:vcSlXfUaks2peBRjfM5l2xaEbh64rBDs
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-