Behavioral task
behavioral1
Sample
6036-345-0x0000000000400000-0x00000000004F8000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6036-345-0x0000000000400000-0x00000000004F8000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
6036-345-0x0000000000400000-0x00000000004F8000-memory.dmp
-
Size
992KB
-
MD5
61c3312cc4d64726a409c3f5b297bc23
-
SHA1
8c0f5579133a6ff1abdd72cbd7119f1fb2f3ee1a
-
SHA256
db21b301bbff1195e8059ecff274cd832fe47dd1ba4cb3416b884d67811320d8
-
SHA512
f483d18410afbfb7e843fbb76342c05f9ffe1d31c3603a53076447f6284270f71baf85af6146b0080fdd3e5e765073839cf1587570618e6fb4feadd4bc24247a
-
SSDEEP
12288:xsenlkXFuhXfSIFlMLa/xe/BulW3vf/C0:aelkXMhXfSIF2Loe/Buk/fq0
Malware Config
Extracted
vidar
52
937
https://t.me/hollandracing
https://busshi.moe/@ronxik321
-
profile_id
937
Signatures
Files
-
6036-345-0x0000000000400000-0x00000000004F8000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ