Resubmissions

21-01-2025 18:41

250121-xb31baxlem 10

21-01-2025 18:28

250121-w4chdsxjfp 10

14-01-2025 17:55

250114-whtvjsvlaz 10

14-01-2025 17:51

250114-wfg3zavkb1 10

14-01-2025 16:15

250114-tqfa1ssncw 10

13-01-2025 10:33

250113-mlhf9aymaz 10

11-01-2025 23:03

250111-21xbaatmgz 7

11-01-2025 22:53

250111-2vd8hswjdn 10

05-01-2025 19:04

250105-xqxrvavngm 10

05-01-2025 18:50

250105-xhbveaspat 10

General

  • Target

    66bddfcb52736_vidar.bin.zip

  • Size

    187KB

  • Sample

    250111-21xbaatmgz

  • MD5

    a284b21c1e928fe4ede4ddbeddfcd391

  • SHA1

    d5260a53b780a6308c639d2b89116ef5bbe992d7

  • SHA256

    8b34e6283a4e30009a0ad792723817cfb0d5cdbbbe119948aa6e887bd59e1620

  • SHA512

    64ee76b87be812c3c82c5716cd3d7c7065c0522fdbd774b1d745d67ab69a2299df3dd9d52e150188b860c9220435658fb3140f7317ad59a3fac76f864337203a

  • SSDEEP

    3072:6NaGrsZYYgA7AaNGNjF1kTWWdNYArOLE99nkVHr/8J9bykSEN2vvBhat0658GZqa:GSuYvfN+4TZNYAKLGaHb09q0eBIO658W

Score
7/10

Malware Config

Targets

    • Target

      66bddfcb52736_vidar.bin.zip

    • Size

      187KB

    • MD5

      a284b21c1e928fe4ede4ddbeddfcd391

    • SHA1

      d5260a53b780a6308c639d2b89116ef5bbe992d7

    • SHA256

      8b34e6283a4e30009a0ad792723817cfb0d5cdbbbe119948aa6e887bd59e1620

    • SHA512

      64ee76b87be812c3c82c5716cd3d7c7065c0522fdbd774b1d745d67ab69a2299df3dd9d52e150188b860c9220435658fb3140f7317ad59a3fac76f864337203a

    • SSDEEP

      3072:6NaGrsZYYgA7AaNGNjF1kTWWdNYArOLE99nkVHr/8J9bykSEN2vvBhat0658GZqa:GSuYvfN+4TZNYAKLGaHb09q0eBIO658W

    Score
    7/10
    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Probable phishing domain

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks