Behavioral task
behavioral1
Sample
4440-145-0x0000000000340000-0x00000000003B2000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4440-145-0x0000000000340000-0x00000000003B2000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
4440-145-0x0000000000340000-0x00000000003B2000-memory.dmp
-
Size
456KB
-
MD5
3c84530a97c5583e79e9e3542320939b
-
SHA1
02f4338c3e299a577f17808604a77321b1a3224f
-
SHA256
84187f63e56afca612241940507e25deae9a464c07910514c6d66d399e376614
-
SHA512
028c8de033cfbce788b55086c3dc7b98ee6bf6d6200f0e1a3534c26fda4f415f281197e6f9e2854b90a660e457fe33078e7130e142fea07f6a5633f462af9769
-
SSDEEP
12288:zgN4bd1cHuKamVen1pvi6zZhazHhDV9CG:zBmV4pvi6z6Bh9CG
Malware Config
Extracted
vidar
2.4
589
-
profile_id
589
Signatures
-
Vidar family
Files
-
4440-145-0x0000000000340000-0x00000000003B2000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ