Behavioral task
behavioral1
Sample
1580-56-0x0000000000400000-0x00000000009C4000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1580-56-0x0000000000400000-0x00000000009C4000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1580-56-0x0000000000400000-0x00000000009C4000-memory.dmp
-
Size
5.8MB
-
MD5
ae5a7ea596b6cbf7b59a0b662cfa0a26
-
SHA1
d1f6f6949f97ad1d7eba5ca5262dd8e124a44cdc
-
SHA256
e052491c86ad91d98f567ef78c31669fa7fd3efde96a666233790edcd3b135ca
-
SHA512
e653002a2227a4f8e13c6fbd2afcd60c17c0b820970a15943b745550cfc76b55f53956f0527d71b9b258b421b4df5945218393bbfe5108c8ad5f6c742707c925
-
SSDEEP
98304:bVlelZAbN6p2tiCeD9cnjBINDNeqD1P6IbUUJbLsTF8HLUh7:buEEao9cmNf1lo2UFp
Malware Config
Extracted
vidar
3.5
e7e09acfdc34dcd90c788fb37ce30c63
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
e7e09acfdc34dcd90c788fb37ce30c63
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1580-56-0x0000000000400000-0x00000000009C4000-memory.dmp
Files
-
1580-56-0x0000000000400000-0x00000000009C4000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 3.1MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE