Behavioral task
behavioral1
Sample
1156-154-0x0000000000970000-0x0000000000DF9000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1156-154-0x0000000000970000-0x0000000000DF9000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1156-154-0x0000000000970000-0x0000000000DF9000-memory.dmp
-
Size
4.5MB
-
MD5
ad68e8e7d2ae1f50d597e533811330de
-
SHA1
f0bdb7ddf1d1473fbc875646d70a619f0b530ffe
-
SHA256
f2cf59f0622807904afce70a1022cf21de78c4db13a60a1ef8dcc374ed8abb50
-
SHA512
d459a71852f1c6f9fe35ac7627e10ae2f9ffe1df1e050a07e088c3c4eff57e7fc1f91722a4836df425fa1e9b4f5fbd6f82e05cbc816648ce90e6242a3df45d50
-
SSDEEP
49152:kiuE1/cgGy5qY/2FXLkPEsCV+83uj+hH5Uz1Ov/FpK:kiuNJkuLsEFV+v+x5URKv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
1156-154-0x0000000000970000-0x0000000000DF9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE