General
-
Target
3924-371-0x0000000000400000-0x000000000046C000-memory.dmp
-
Size
432KB
-
Sample
240305-p7naqsfc8z
-
MD5
76ef4f5728861281ae77fb8ef7cf780f
-
SHA1
bad5ef1bcd1c3c85ed2d5d77a01c76f2ee98a3a6
-
SHA256
0aaa55c40b6c87ea528cc38083c619455e6b8e7e01d6e1d313da8cefcadb3cea
-
SHA512
8e03675165692e8d1ef7cc4b4dfdad163fd3cd23159050c25c29fe485182a04d18ffbd49eaf3983afd1b783d3b14a56e6199b0ad4a6b739d74b75e1590781a7c
-
SSDEEP
6144:z66+X5aG78XAIn2RN2iy3g8UpioUb65qJfbri5bMuCV4aJSqdBFJVkShVU:z6HX5aG782ook65G/id5CV5JvZVk
Behavioral task
behavioral1
Sample
3924-371-0x0000000000400000-0x000000000046C000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3924-371-0x0000000000400000-0x000000000046C000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
vidar
3.5
bf58e1879f88b222ba2391682babf9d8
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
bf58e1879f88b222ba2391682babf9d8
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Targets
-
-
Target
3924-371-0x0000000000400000-0x000000000046C000-memory.dmp
-
Size
432KB
-
MD5
76ef4f5728861281ae77fb8ef7cf780f
-
SHA1
bad5ef1bcd1c3c85ed2d5d77a01c76f2ee98a3a6
-
SHA256
0aaa55c40b6c87ea528cc38083c619455e6b8e7e01d6e1d313da8cefcadb3cea
-
SHA512
8e03675165692e8d1ef7cc4b4dfdad163fd3cd23159050c25c29fe485182a04d18ffbd49eaf3983afd1b783d3b14a56e6199b0ad4a6b739d74b75e1590781a7c
-
SSDEEP
6144:z66+X5aG78XAIn2RN2iy3g8UpioUb65qJfbri5bMuCV4aJSqdBFJVkShVU:z6HX5aG782ook65G/id5CV5JvZVk
Score3/10 -