Behavioral task
behavioral1
Sample
5072-274-0x0000000001250000-0x00000000016D9000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5072-274-0x0000000001250000-0x00000000016D9000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
5072-274-0x0000000001250000-0x00000000016D9000-memory.dmp
-
Size
4.5MB
-
MD5
ba5cfe42227baa34d3c91993a5af89b9
-
SHA1
4222839d5a38af2af0c8e5543e6fb5039f8725ba
-
SHA256
fd7e1c44b71707ef74403d6071c1999f2761889370f187aacfe639f7cbd0c92c
-
SHA512
9b8b2c1779faa34efdf1d31768bb6acd039e5b8aa99b6b16eb20322a039d041ef4c6cdb3f3a4010e053c4ab2daa632de213971e36ce5f994252461b5a1448f00
-
SSDEEP
49152:EAIYx6U5y5qgcmE4LkLEsCV+83uj+hH5Uz1OvjFpK:EAwWUtLIEFV+v+x5URuv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
5072-274-0x0000000001250000-0x00000000016D9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE