Behavioral task
behavioral1
Sample
1796-197-0x0000000000400000-0x00000000032A0000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1796-197-0x0000000000400000-0x00000000032A0000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1796-197-0x0000000000400000-0x00000000032A0000-memory.dmp
-
Size
46.6MB
-
MD5
2c4ebf54e54b2616364482f9f2b15d75
-
SHA1
f460183206f819eae8404cf9b4df831889817609
-
SHA256
e03d9756c29c3b0a4e2807e6f150f6b2bb1f98b7a1d5430e629548cef58bc96d
-
SHA512
cd7e26fab47219e18e9b6e3314eafb1a96e9e3237d6b0e05d43fb21262ff6268350b993f5c5c929beeb180fa17c20180d40dbd41a45f16b1b1ac6f3dbf8a7386
-
SSDEEP
12288:CPy+9p2HD970QYzfemkdBSUjmtiV+h2CtY//7cHHlSu2XvRFjb4xh9FaoLRm/Jzo:CPZiD9UemkeFau2gY//An4j5FQu5Bv
Malware Config
Extracted
vidar
39.8
706
https://xeronxikxxx.tumblr.com/
-
profile_id
706
Files
-
1796-197-0x0000000000400000-0x00000000032A0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 517KB - Virtual size: 517KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE