Behavioral task
behavioral1
Sample
3528-153-0x0000000000CC0000-0x0000000001149000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3528-153-0x0000000000CC0000-0x0000000001149000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
3528-153-0x0000000000CC0000-0x0000000001149000-memory.dmp
-
Size
4.5MB
-
MD5
b7657ead46e4b5805c476c6a3105e01b
-
SHA1
843e9eb757ce3e9d62609e6f71083c5e0a449048
-
SHA256
5fb6dabd42c6e4b5c142d2bb3d6e3cf9ed3fef693ffba907c18e1a70ecd114ab
-
SHA512
9b336f28f39e4cb07c0a45443e9748256bac1248689509ad94c1012329a6b2d911d847479c40d11e715da999633862247d0de20847ddc6bdea8a9b377c17fee3
-
SSDEEP
49152:mi0eNG8py5qwPKpWLkvEsCV+83uj+hH5Uz1OvpFpK:miWaMjL0EFV+v+x5URcv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
3528-153-0x0000000000CC0000-0x0000000001149000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE