General
-
Target
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d
-
Size
687.1MB
-
Sample
241221-tj8c8asmbz
-
MD5
afa3ab248ae8ffea5f1a013de4489f92
-
SHA1
23f7b778ffce856f6b34911beca40b8a1af5ab0e
-
SHA256
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d
-
SHA512
fe6a0d485e9ee08214d5da06d86d7d70471239cc962856d3db2eba1f731ab885db32bd2bbc1765dd671adb192e71fe69c87f207b5cbd10dda147e5f38e55f71b
-
SSDEEP
12288:r2NOhN0MUF7G2s7yM8vsbaSo6Ip0UHdu3NA1J:iNy4+yMMsboZp0UHr
Static task
static1
Behavioral task
behavioral1
Sample
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe
Resource
win7-20241010-en
Malware Config
Extracted
vidar
1.7
713
https://t.me/robloxblackl
https://steamcommunity.com/profiles/76561199458928097
http://135.181.204.67:80
-
profile_id
713
Targets
-
-
Target
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d
-
Size
687.1MB
-
MD5
afa3ab248ae8ffea5f1a013de4489f92
-
SHA1
23f7b778ffce856f6b34911beca40b8a1af5ab0e
-
SHA256
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d
-
SHA512
fe6a0d485e9ee08214d5da06d86d7d70471239cc962856d3db2eba1f731ab885db32bd2bbc1765dd671adb192e71fe69c87f207b5cbd10dda147e5f38e55f71b
-
SSDEEP
12288:r2NOhN0MUF7G2s7yM8vsbaSo6Ip0UHdu3NA1J:iNy4+yMMsboZp0UHr
-
Vidar family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-