Behavioral task
behavioral1
Sample
1932-153-0x0000000000D30000-0x00000000011B9000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1932-153-0x0000000000D30000-0x00000000011B9000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1932-153-0x0000000000D30000-0x00000000011B9000-memory.dmp
-
Size
4.5MB
-
MD5
896068cae919f32511d8a1ea6ebd2366
-
SHA1
4f082552d92844f507ee88e64f0044511478aed2
-
SHA256
1614797b67887ade0cb7fc031895a882ddeeaedf7a15a05b597251897e99352e
-
SHA512
93ac53270cf40d059cfb18f4b140268b0dd6f59952ef6764281bf104964fa52eb0f93ea883695e5655a33a3549ca5c2228f1e3d2f804a53d03b95daa7c126d19
-
SSDEEP
49152:kJ8xHEWiy5q7b2uZLkcEsCV+83uj+hH5Uz1OvEFpK:kJhXfTL3EFV+v+x5URtv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
1932-153-0x0000000000D30000-0x00000000011B9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE