General
-
Target
lem.exe
-
Size
1.0MB
-
Sample
250129-19n6lazlgr
-
MD5
7723d62c8a6c95004f746afa54e8460b
-
SHA1
01dff9bfe0bbb49ce51e611cbb9233d74ba1a596
-
SHA256
d80007837ee60fe9537c76e6a3d45005a86ddc3e066e608b57e1d4430cb96df4
-
SHA512
b55fef5246a4ada84a799e9e3ae6026ecc47566bf6150c3377d9dad743ff7f0c5a17759d0c1a121e4d530dae9ad60db0d21168d0180bcd63c6160f5927e84fcd
-
SSDEEP
24576:s7wiALdYAa0xGv7L0TDQUjHA90zWy64aL/MxED:cIuAaoTkU0x1L5
Static task
static1
Behavioral task
behavioral1
Sample
lem.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
https://t.me/m08mbk
https://steamcommunity.com/profiles/76561199820567237
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Targets
-
-
Target
lem.exe
-
Size
1.0MB
-
MD5
7723d62c8a6c95004f746afa54e8460b
-
SHA1
01dff9bfe0bbb49ce51e611cbb9233d74ba1a596
-
SHA256
d80007837ee60fe9537c76e6a3d45005a86ddc3e066e608b57e1d4430cb96df4
-
SHA512
b55fef5246a4ada84a799e9e3ae6026ecc47566bf6150c3377d9dad743ff7f0c5a17759d0c1a121e4d530dae9ad60db0d21168d0180bcd63c6160f5927e84fcd
-
SSDEEP
24576:s7wiALdYAa0xGv7L0TDQUjHA90zWy64aL/MxED:cIuAaoTkU0x1L5
-
Vidar family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-