Behavioral task
behavioral1
Sample
2044-154-0x0000000000040000-0x00000000004C9000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2044-154-0x0000000000040000-0x00000000004C9000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2044-154-0x0000000000040000-0x00000000004C9000-memory.dmp
-
Size
4.5MB
-
MD5
f34a4ed050cff937350b6cfef0350d62
-
SHA1
534b0c9e11d84ac62805dd3eaad4845b9d5e970d
-
SHA256
b088e82d4176f4c07a9acbf131c07e9c30e0d9e3d5fc0c1dc1f7328ca20212b8
-
SHA512
39c7735003127d776dd00b87c2041721780a631f84a453a2028699af44ab47ecb9f031a71ef4621d705728d613e95b78d831d3043df0d0176abf3de74f59befd
-
SSDEEP
49152:mKkG9GTxy5q8PKasLksEsCV+83uj+hH5Uz1Ov2FpK:mKu14GL3EFV+v+x5URvv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
2044-154-0x0000000000040000-0x00000000004C9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE