Behavioral task
behavioral1
Sample
4672-153-0x0000000000600000-0x0000000000A89000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4672-153-0x0000000000600000-0x0000000000A89000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
4672-153-0x0000000000600000-0x0000000000A89000-memory.dmp
-
Size
4.5MB
-
MD5
efefb6319ff161306b5c385fe2a6fff6
-
SHA1
a7088fea1e5f0cf0e5959bd5659a54cddc2258a4
-
SHA256
65853b239ba6b6d2abd0698c1528b00d6bdbf38be3a29a016bf943a9f3e94966
-
SHA512
afa0db46c5fa6ed1c3f8aeddd8c4392c9ddf8355a4b7b3079de39c54f390402c047a789acc4d7abd63c1172cc1159c9c0e50f851ecf999bb0c2eaf260b4f475b
-
SSDEEP
49152:mesKFWeVy5qD1SmQLkuEsCV+83uj+hH5Uz1OviFpK:meaAXULREFV+v+x5URXv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
4672-153-0x0000000000600000-0x0000000000A89000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE