Behavioral task
behavioral1
Sample
4896-150-0x00000000001D0000-0x0000000000659000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4896-150-0x00000000001D0000-0x0000000000659000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
4896-150-0x00000000001D0000-0x0000000000659000-memory.dmp
-
Size
4.5MB
-
MD5
3884f5c941a07afbe0a39cffd222b455
-
SHA1
030664b5f1456359e2562d38e38e6ef961f42572
-
SHA256
3481141184d21bf6a3166c9287c44b0feab512a1079faf15196a5330ac3363af
-
SHA512
8f0ef66f75cb456d643da9ab4dfa804472be111ab5a10755a24c9c89e0bf44eaafbc5d10a9993f91c5d2ed4e4111d608e4bbeaea0869625e1eb8c09c2f988f0e
-
SSDEEP
49152:87ETPvUAUy5qoFSUBLkXEsCV+83uj+hH5Uz1OvWFpK:87+8Tk3LMEFV+v+x5URzv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
4896-150-0x00000000001D0000-0x0000000000659000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE