Behavioral task
behavioral1
Sample
2588-135-0x0000000000400000-0x0000000000469000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2588-135-0x0000000000400000-0x0000000000469000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2588-135-0x0000000000400000-0x0000000000469000-memory.dmp
-
Size
420KB
-
MD5
0b09d32a254a5db3da9756e51285c6a8
-
SHA1
0ab9b10fcb798865f17bc655cd5613ed57d6de4a
-
SHA256
1039b7098d03b14e6f56cc0bfa412eba9912ded07cd63ecc1a618f1c1e81f1c0
-
SHA512
f6f022037801251b5cf66ebef55d646f8b37c43fe933337e24dd59f260ef1e55eecace91501270c6f27162bb8154c3227c84f898bd6925c6ef0f1c3f8850e07a
-
SSDEEP
6144:g7RuOykrfGN/krlZEaYgy68YC7Wi9jtwJgxpcxqeHivYal0qiG/1OBM:uuOykrONM3Ek3xU9jttSxqeHigag2
Malware Config
Extracted
vidar
55
1718
https://t.me/truewallets
https://mas.to/@zara99
http://116.203.10.3:80
-
profile_id
1718
Signatures
-
Vidar family
Files
-
2588-135-0x0000000000400000-0x0000000000469000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 238KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ