Behavioral task
behavioral1
Sample
832-56-0x0000000000400000-0x0000000000AE0000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
832-56-0x0000000000400000-0x0000000000AE0000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
832-56-0x0000000000400000-0x0000000000AE0000-memory.dmp
-
Size
6.9MB
-
MD5
32f73d5938342fbba2025c78234e68d9
-
SHA1
d409d69829e98de1f82665915579ef74b338976f
-
SHA256
18c3d796391238712c0cf9602c46e81817e4831c0b2f860d7e6b689b74c3dee1
-
SHA512
befc3e916fa012dbc926a946e27d26836e1210351b52a38e1e6194e59da9081ddcbfa10441ca5f4b68111e7b3616e87716278c558b5ce764efc950b509576bb6
-
SSDEEP
196608:4tsRiDlPE4WEIaBSaFrhEKlAer3KybFlG:4tsRkHZBDrhEUZrzxlG
Malware Config
Extracted
vidar
3.4
76b614a229b9a88f7d0ba57796ab0fc2
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
76b614a229b9a88f7d0ba57796ab0fc2
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Signatures
-
Vidar family
Files
-
832-56-0x0000000000400000-0x0000000000AE0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 3.7MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE