Behavioral task
behavioral1
Sample
1680-56-0x0000000000310000-0x0000000000977000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1680-56-0x0000000000310000-0x0000000000977000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1680-56-0x0000000000310000-0x0000000000977000-memory.dmp
-
Size
6.4MB
-
MD5
bd3c1989a7a0d25b1323ee7b1feaf233
-
SHA1
c5390fa2eb2e2b943d217c65ff03510955fe59c5
-
SHA256
427c493cd75e65eb2e5163cd2644237c733247771de41c10d52c9d7eb1b8de73
-
SHA512
859aa9485b70dc1b40acb80355c3ed9276d2a3e657c49861b4eb32495146afab6ecebc53fa503e6f9f6fee15192e5d46499dcec93442b9a8ce5639f54098cad3
-
SSDEEP
98304:9tEBPrKvTvEuxRvYVjPKIX3MwUcBW0tTJDwJ4zUOi:IOvTvRbk/M9cBHJD6IUOi
Malware Config
Signatures
-
Vidar family
Files
-
1680-56-0x0000000000310000-0x0000000000977000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 2.2MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE