Behavioral task
behavioral1
Sample
3192-149-0x0000000000E70000-0x00000000012F9000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3192-149-0x0000000000E70000-0x00000000012F9000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
3192-149-0x0000000000E70000-0x00000000012F9000-memory.dmp
-
Size
4.5MB
-
MD5
9fc90bbf9361d57549ce6fed551047b8
-
SHA1
9570c40bfa13f0c371b47eba915417022217f65b
-
SHA256
a9230633644c6caff8e1ed5248f7379dc739f081265cf6de20d6d55712302ec9
-
SHA512
d8af1ca5c5ceec34c9adb317eeb852f911b71cf0637ce8060fa03a13d16c8b1062f5abf2b5813c988b542a48712c4c0fb4e50b36b695fa37d0a5bfee5155f54c
-
SSDEEP
49152:E1kl/89Wy5qw027MLkoEsCV+83uj+hH5Uz1OvBFpK:E19AciLDEFV+v+x5URAv
Malware Config
Extracted
vidar
2.2
237
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
237
Signatures
-
Vidar family
Files
-
3192-149-0x0000000000E70000-0x00000000012F9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE