Analysis
-
max time kernel
132s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe
Resource
win10v2004-20241007-en
General
-
Target
49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe
-
Size
656.1MB
-
MD5
0abfdf56ba9ffad0f0b5acf452fffc21
-
SHA1
faa5193485942b082977501af0387fc0044f1408
-
SHA256
49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a
-
SHA512
44de0815c12ea392f0bcd8e3ddb080976ea4ab0f871731a0a72b8253ca25f4f758c9deb7a8bfe3c886e8f764ffcec2765fb2925a0fd09959e37266eb83470c7d
-
SSDEEP
12582912:tQyQyQyQyQyQyQyQDQyQyQyQyQyQyQyQDQyQyQyQyQyQyQyQDQyQyQyQyQyQyQyJ:tnnnnnnn+nnnnnnn+nnnnnnn+nnnnnnJ
Malware Config
Extracted
vidar
4.7
546019998817b2240ed92f3cb7f221e3
https://t.me/eagl3z
https://steamcommunity.com/profiles/76561199159550234
-
profile_id_v2
546019998817b2240ed92f3cb7f221e3
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq
Signatures
-
Vidar family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1248 49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe 1248 49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe"C:\Users\Admin\AppData\Local\Temp\49736f92b490af172fe948a657ccce80b7ec53c88c2b2c2a670e89fed20a790a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248