Behavioral task
behavioral1
Sample
4264-153-0x0000000000570000-0x00000000009F9000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4264-153-0x0000000000570000-0x00000000009F9000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
4264-153-0x0000000000570000-0x00000000009F9000-memory.dmp
-
Size
4.5MB
-
MD5
101ffd2d3ef94a0de835446081f4f80e
-
SHA1
629a9b8e5b5c71c0705e8ac9286b98af7c93d2c1
-
SHA256
75883ebfc04b04d301d468793d8f85c6677ff17733b6e5356affbdb83cdfb5fe
-
SHA512
6713d19099634eebeac9dec094d0f4e9d1296a61df1174199fb527932b7436b6c55d816fc108e42c0ee6a2214eab614771b5e32d758098f1b438d469e2bd8921
-
SSDEEP
49152:C5lE1/cGGy5quZ2j7LkOEsCV+83uj+hH5Uz1OvBFpK:klNb6SLREFV+v+x5URIv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
4264-153-0x0000000000570000-0x00000000009F9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE