General
-
Target
AppInstaIIer.exe
-
Size
34.7MB
-
Sample
230721-kq91ysdh3y
-
MD5
79e7fd3f75d702060da1bce9fffc1db2
-
SHA1
308a13aa1d631fdf862c28184f5c4892a50427e4
-
SHA256
c9c5581052462560bfe4587156b906c309ab10b19c5fe005a064384593609901
-
SHA512
b6cda84590cf6ad44bb6e5a7750a886cc6a48395eb834f47144c6ee7b076b891154b68f5fea7d3c6b8cfb9521fcb494eddb2c6ca676f985be407c49f9857f32b
-
SSDEEP
786432:G7dVMxn9bYyICJVmqPt0+nNICoie+MqNOym5v:GQnGBentbnd0/v
Static task
static1
Behavioral task
behavioral1
Sample
AppInstaIIer.exe
Resource
win10-20230703-en
Malware Config
Extracted
vidar
4.8
https://t.me/jsvbdyufwibascq
https://t.me/jsvbdyufwibascq
https://t.me/sundayevent
https://steamcommunity.com/profiles/76561198982268531
-
profile_id_v2
https://t.me/jsvbdyufwibascq
-
user_agent
Mozilla/5.0 (X11; Linux 3.5.4-1-ARCH i686; es) KHTML/4.9.1 (like Gecko) Konqueror/4.9
Extracted
systembc
91.103.252.89:4317
91.103.252.57:4317
Targets
-
-
Target
AppInstaIIer.exe
-
Size
34.7MB
-
MD5
79e7fd3f75d702060da1bce9fffc1db2
-
SHA1
308a13aa1d631fdf862c28184f5c4892a50427e4
-
SHA256
c9c5581052462560bfe4587156b906c309ab10b19c5fe005a064384593609901
-
SHA512
b6cda84590cf6ad44bb6e5a7750a886cc6a48395eb834f47144c6ee7b076b891154b68f5fea7d3c6b8cfb9521fcb494eddb2c6ca676f985be407c49f9857f32b
-
SSDEEP
786432:G7dVMxn9bYyICJVmqPt0+nNICoie+MqNOym5v:GQnGBentbnd0/v
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-