Behavioral task
behavioral1
Sample
1508-234-0x0000000000400000-0x0000000001DCC000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1508-234-0x0000000000400000-0x0000000001DCC000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1508-234-0x0000000000400000-0x0000000001DCC000-memory.dmp
-
Size
25.8MB
-
MD5
736d9358a69ade85a01e449d4ae5e559
-
SHA1
b8d5b6087a0b92795edded1f626795e841be1291
-
SHA256
cc9199b900c8c5f8091672324ee1243b07c4867c93eee3f8c19b4d654302b93c
-
SHA512
1edcb512c24c2044e30ea0098cb05e5be61e69325160dbf2af59a96dcb28bcd58602e459eb47361c7de179ca433718740091637b8a4e7b38db3a637496672c72
-
SSDEEP
24576:vPOHEi9bozJD9WvK3UdnUEvd+chXNj7M:PcbozJD9jkdUWd+KfM
Malware Config
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Files
-
1508-234-0x0000000000400000-0x0000000001DCC000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 517KB - Virtual size: 517KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE