Behavioral task
behavioral1
Sample
1340-554-0x0000000000400000-0x00000000004AA000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1340-554-0x0000000000400000-0x00000000004AA000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1340-554-0x0000000000400000-0x00000000004AA000-memory.dmp
-
Size
680KB
-
MD5
d00295dc3c36f44dd231cd7c77d4c0e6
-
SHA1
d593188ed835689c871b18a0da5097b0ef6802a9
-
SHA256
7e2f1e46ce05a38ff40981aa5fcfd69baca7cf5e5104660ed7724b16977e6d22
-
SHA512
619353be685788f279c62e6429ac2320a8e42430fa0235c889fc006a7b730d7724aa102e1aa337c15086918336e669b5e0fc4e0ebd108a372b73d0cf7ee529c1
-
SSDEEP
12288:RPy+9p2HD970QYzfemkdBSUjmtiV+h2CtY//7cHHlSu2XvRFj54wh9FaoLRm/Jz5:RPZiD9UemkeFau2gY//An4j5Fah5Bl
Malware Config
Extracted
vidar
39.8
828
https://xeronxikxxx.tumblr.com/
-
profile_id
828
Files
-
1340-554-0x0000000000400000-0x00000000004AA000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 517KB - Virtual size: 517KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE