Behavioral task
behavioral1
Sample
4660-285-0x0000000001160000-0x00000000015E9000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4660-285-0x0000000001160000-0x00000000015E9000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
4660-285-0x0000000001160000-0x00000000015E9000-memory.dmp
-
Size
4.5MB
-
MD5
84b055c52cb741dc88a79436096867fc
-
SHA1
23de0bd436d63cadef2110a95a133343ed5a5fb5
-
SHA256
ac4a5e7b0c9ba60b0ed62f075fd3d237996f613fabfd4ab427eea73d93b34b48
-
SHA512
fcdf748808ef5ad8cbb2f5c73c567972cd3b086309284c3542eb4e6edced1305b1145754615fb305f4e85563e3bc5ed3af7f938bf8ea9285fc87844968a0cc10
-
SSDEEP
49152:m7Yn7wthy5qDGSTdLkoEsCV+83uj+hH5Uz1OvkFpK:m7z3X5LLEFV+v+x5URRv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
4660-285-0x0000000001160000-0x00000000015E9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE