Behavioral task
behavioral1
Sample
5048-151-0x00000000000A0000-0x0000000000529000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5048-151-0x00000000000A0000-0x0000000000529000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
5048-151-0x00000000000A0000-0x0000000000529000-memory.dmp
-
Size
4.5MB
-
MD5
e13be6276966e1fb8c23e609f40d2781
-
SHA1
2fbf0c89db635571252d6685f613f2ab99dfa2ca
-
SHA256
c89613896e485a49aa73dab80376a9df9d8c47d4c93c7650e75f6fcacd710bbe
-
SHA512
92868aaf685ef4e919077772ad629fb97ea8a0b8a54f0daddbc975420943ca3645174cc72c4e7fcf4ab7f30e0b7229293845e12fb2b6c3175c3c560bce92aed2
-
SSDEEP
49152:Cw8UBCPPy5q7b6pBXLktEsCV+83uj+hH5Uz1Ov7FpK:Cww3v2vLyEFV+v+x5URev
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
5048-151-0x00000000000A0000-0x0000000000529000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE