Behavioral task
behavioral1
Sample
1732-63-0x0000000000400000-0x000000000045B000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1732-63-0x0000000000400000-0x000000000045B000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1732-63-0x0000000000400000-0x000000000045B000-memory.dmp
-
Size
364KB
-
MD5
87bb39dda804f2a7d6ca89ed69ac54ec
-
SHA1
e6d9f9d1640d1f5a96f2744306160601d7c4653a
-
SHA256
8ac80355e70882845416bd77e1855448a7eda47d6f7f7bd17850a5bb53fc22ff
-
SHA512
7a0d2908234c55670e323499ec6f67966d9e3ed66c10de463fc0bc55214e2ee412d3fc4e7587f5c9380dc875c65dd5ef015dd8963fa6fbd496e1ce795f054a80
-
SSDEEP
3072:W7lgGlf4+EMQMVjd3LQ8VdRI40I683JqlrmtFi6ypaE0bWZYNmGCbDf:gl5x8MVxLxHRI40I6+yAi6jrCZYN+
Malware Config
Extracted
vidar
54.7
1663
https://t.me/trampapanam
https://nerdculture.de/@yoxhyp
-
profile_id
1663
Signatures
-
Vidar family
Files
-
1732-63-0x0000000000400000-0x000000000045B000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ