General

  • Target

    a3cf5d3ca50eea72061d2d22376267cb26f4a116218f6faaf6d94dca61c10d10.exe

  • Size

    695KB

  • Sample

    241123-3zf4catjh1

  • MD5

    f27d61ee5444bba915003c57e2b67971

  • SHA1

    413345ea52d29b49bc443ffb101a3890de8ee745

  • SHA256

    a3cf5d3ca50eea72061d2d22376267cb26f4a116218f6faaf6d94dca61c10d10

  • SHA512

    613fa4d90fdf7b1b5b0bb647b90facd121ab3f547478094bb8cc2b082655fcbe7c32d0702419a1e3945f7ffdabef5ac6a45b1f3dc5a22c70e1bdf8779a07f0ac

  • SSDEEP

    12288:2T89b66pQ9b/rrijldt/ET+3EaTDRlt+fCKzPFOpjTqDNxD4:2A565XWjjtcedTDRL+7J5K

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

1044

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    1044

Targets

    • Target

      a3cf5d3ca50eea72061d2d22376267cb26f4a116218f6faaf6d94dca61c10d10.exe

    • Size

      695KB

    • MD5

      f27d61ee5444bba915003c57e2b67971

    • SHA1

      413345ea52d29b49bc443ffb101a3890de8ee745

    • SHA256

      a3cf5d3ca50eea72061d2d22376267cb26f4a116218f6faaf6d94dca61c10d10

    • SHA512

      613fa4d90fdf7b1b5b0bb647b90facd121ab3f547478094bb8cc2b082655fcbe7c32d0702419a1e3945f7ffdabef5ac6a45b1f3dc5a22c70e1bdf8779a07f0ac

    • SSDEEP

      12288:2T89b66pQ9b/rrijldt/ET+3EaTDRlt+fCKzPFOpjTqDNxD4:2A565XWjjtcedTDRL+7J5K

MITRE ATT&CK Enterprise v15

Tasks