Analysis
-
max time kernel
9s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
4e5179eec2634bdfabe616fee23790ed.exe
Resource
win7-20231129-en
General
-
Target
4e5179eec2634bdfabe616fee23790ed.exe
-
Size
665KB
-
MD5
4e5179eec2634bdfabe616fee23790ed
-
SHA1
b2dc1c249b271c8dbd87d9a54d8fbb5a6158dc25
-
SHA256
aec939deb139f7f80a4e618f076ed2fe80d7f2bed77ba59336b1fd0470a0d7fa
-
SHA512
329d13890afbf7cc64f61bbee39ebd9a1b1fda2065ee6e0f9d54adcdcb27a27db16d5143c21c71d0b141b8c207b3061b83670411c0eee196b9a3a98770682441
-
SSDEEP
12288:Qm5XCDJXxwcfU98GHWp8De2VQKVncHsoJSt1U5bSOT4v9cgjCc0sYnxnVW:edXxwMp8fVQKZcHzJSnMbSCgj3Yne
Malware Config
Extracted
vidar
39.7
828
https://shpak125.tumblr.com/
-
profile_id
828
Signatures
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/756-3-0x0000000000400000-0x00000000004C2000-memory.dmp family_vidar behavioral1/memory/756-2-0x00000000002C0000-0x000000000035D000-memory.dmp family_vidar behavioral1/memory/756-14-0x0000000000400000-0x00000000004C2000-memory.dmp family_vidar behavioral1/memory/756-49-0x00000000002C0000-0x000000000035D000-memory.dmp family_vidar -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2872 756 WerFault.exe 4e5179eec2634bdfabe616fee23790ed.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3B41.tmpFilesize
17KB
MD52a69a1f9404ee2f300421e12fe0ca5a5
SHA174b1166dfcd1a856cdd7bdfae9db67a6cd4c2e7f
SHA256db12b5ea4a67d73812e65ad474af65d40c769e84ada09c2db144da719eb2d220
SHA51243f486cf23eca5dbe80075e04ca26b074e68396034a206da30c52cf37ee3cc9b79dfd3089d676afdbecd38b055e71520eb302b14f7741261c051e714fd599e08
-
memory/756-3-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/756-2-0x00000000002C0000-0x000000000035D000-memory.dmpFilesize
628KB
-
memory/756-1-0x0000000000560000-0x0000000000660000-memory.dmpFilesize
1024KB
-
memory/756-14-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/756-44-0x0000000000560000-0x0000000000660000-memory.dmpFilesize
1024KB
-
memory/756-49-0x00000000002C0000-0x000000000035D000-memory.dmpFilesize
628KB