Behavioral task
behavioral1
Sample
1928-79-0x0000000001130000-0x0000000001849000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1928-79-0x0000000001130000-0x0000000001849000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1928-79-0x0000000001130000-0x0000000001849000-memory.dmp
-
Size
7.1MB
-
MD5
b079e13654fb688ea19f5a6195b73dfa
-
SHA1
45d38b9f2235c09a9d286854da77bdb4aaf96117
-
SHA256
a8cf13ca1874ea144c35c628d9b7924bf64d642b33cfcc4fd7968dfbd52f74c5
-
SHA512
6e1649572cca24b0591a50f8eda0ab1a3a065cc02562800ad9967bbf70a44ec563c0c3a1282ca6295ddcd41b3f0b908088c787689288e3a3216633add745273b
-
SSDEEP
98304:u2mELOviGO/u1GRLYGdhJPcS3BHCDiZEQBs2x4uF/e:bvO6R2uBfJPcmHCOEyyuU
Malware Config
Signatures
-
Vidar family
Files
-
1928-79-0x0000000001130000-0x0000000001849000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 2.6MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE