Behavioral task
behavioral1
Sample
2548-268-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2548-268-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
2548-268-0x0000000000400000-0x0000000000472000-memory.dmp
-
Size
456KB
-
MD5
52c272b1befa05fc85c6dc7d2c57de4f
-
SHA1
021cd92ecbec9c0915d0259080cc9db335a0c3ed
-
SHA256
53e5e06dbe162bc10e56690ac03ca3b9e1455e1977890927ad42f4fde62a78fe
-
SHA512
9cb635193b934257c8d0f8f0f6ab0cb358fcc34837549e0e4de5f7f64bafb690e9298a41beddfd4478a3a63aef030420a442082464f01e6c45a6f995de960a89
-
SSDEEP
6144:JHd2snwZDkCUbuu3zt3FrNPMXDuOYijvaf7tfhDV9MUBilj26C:JHd2sncDkC03JFlMXKujvaf7BhDV9iC
Malware Config
Extracted
vidar
2.4
19
-
profile_id
19
Signatures
-
Vidar family
Files
-
2548-268-0x0000000000400000-0x0000000000472000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ