Behavioral task
behavioral1
Sample
4808-149-0x0000000000A60000-0x0000000000EE9000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4808-149-0x0000000000A60000-0x0000000000EE9000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4808-149-0x0000000000A60000-0x0000000000EE9000-memory.dmp
-
Size
4.5MB
-
MD5
d7d589fd68991b3c1db3940c8c670ceb
-
SHA1
0845ae284fd5150d808d4d63689a582d76d0d2a3
-
SHA256
bfafb90d1953fda7dfd829cf5161f8ba5b250bd19a97148ff152560f6def7289
-
SHA512
8f60df006ae2214ef6c5adb20a0efa5fa8d057785b4532902612264956364d9613dbbb6bf4b9c37d808699892573ed071905f367ad21fd6842bc458861639ed4
-
SSDEEP
49152:qEUoxKkTy5qcq2+MLkyEsCV+83uj+hH5Uz1Ov8FpK:qE8oAJL9EFV+v+x5URpv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
4808-149-0x0000000000A60000-0x0000000000EE9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE