Behavioral task
behavioral1
Sample
1120-72-0x0000000000400000-0x0000000000CBE000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1120-72-0x0000000000400000-0x0000000000CBE000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1120-72-0x0000000000400000-0x0000000000CBE000-memory.dmp
-
Size
8.7MB
-
MD5
2eb98728b359f1dc32895f4452a1cc59
-
SHA1
0e521683ffc3481b8610921d463aabff8b3bd0d4
-
SHA256
90732719c342e3118e651ff698263e3dcb382c3c9359fd40512a6a861e33da42
-
SHA512
2815526666263eda863890c4957904f8399981e70636cb48cbdb2810629ce95cc5233f454bfa359fd6b82dde420a8f7e5c2b37e3cd308280185c784abd438605
-
SSDEEP
12288:2T3mOqtmV5C6TRTDvOCqhJ8PrZOnLJ0wyxbX3/LEEK64TN:4WOqQHJROzhJorZ8dyxbgEK64TN
Malware Config
Extracted
vidar
10.3
231
http://trasolevelqvines.com/
-
profile_id
231
Signatures
Files
-
1120-72-0x0000000000400000-0x0000000000CBE000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 460KB - Virtual size: 460KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE