Behavioral task
behavioral1
Sample
2872-152-0x0000000000780000-0x0000000000C09000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2872-152-0x0000000000780000-0x0000000000C09000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2872-152-0x0000000000780000-0x0000000000C09000-memory.dmp
-
Size
4.5MB
-
MD5
c296ded39474b7fbf436ce0870b8318e
-
SHA1
06f3b8aa27e3bb0ea148f0844dcc9d9ea31c4a5e
-
SHA256
974f6daf5205219628feb106470b4c4aa4da049df58cb567f2fd37a3ec9e8a55
-
SHA512
58e37d15c2ad2a23ae912247e43e642fffee882fbc577322b0ea07c73d86360d37d0b72e8ac299ac290e58d1f6fe77a30640c1841a0b77c120eab7b02117b2c1
-
SSDEEP
49152:JnILysyl2C9y5qEqiwHLkcEsCV+83uj+hH5Uz1OvdFpK:JnILySMYsLPEFV+v+x5URYv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
2872-152-0x0000000000780000-0x0000000000C09000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE