Behavioral task
behavioral1
Sample
4560-149-0x00000000008F0000-0x0000000000D79000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4560-149-0x00000000008F0000-0x0000000000D79000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
4560-149-0x00000000008F0000-0x0000000000D79000-memory.dmp
-
Size
4.5MB
-
MD5
4249a73f796b9efa8f26ee780a09190d
-
SHA1
896653e28fee444bdae3671849947985f748be18
-
SHA256
47cbe4b3c8c5f516da6fc9bc7dc7d2783bff156070974fc399c30e0dfdd0208d
-
SHA512
0c6775ec9cac557b219fabe4ebc5d6269fb1fd643ebfc7735d9c39813658aae58cb8ad00244f3a3c9bbc18fa50eae0c02bfadcc85d870586e4934e461e754abf
-
SSDEEP
49152:0C3IUN/Mvuy5q4sm3GLkBEsCV+83uj+hH5Uz1OvlFpK:0mIlGc8LeEFV+v+x5URkv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
4560-149-0x00000000008F0000-0x0000000000D79000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE