Behavioral task
behavioral1
Sample
1304-55-0x0000000000400000-0x0000000000520000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1304-55-0x0000000000400000-0x0000000000520000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1304-55-0x0000000000400000-0x0000000000520000-memory.dmp
-
Size
1.1MB
-
MD5
b5bd18f88703bd4ab2118ebe79c599e4
-
SHA1
b0d67ef1d4e2f3c79ebe62695cf1a58023bcb580
-
SHA256
e15c193bf927224141b14a95ef30b8ba7b5a0055e39bec478dac0f75e1fad650
-
SHA512
bf03915dd501b18bb664f4cb45ccef3ebee14e9ecc8c0936a44b9fb219fc6d488644637a9338cd6d80530a1dfd3e2b51c180d358466ec4b1595fbcfb66dbc94b
-
SSDEEP
12288:n0Ht9Tp+l0EqE1can/HVk0bXr5OjRPXSvvhkpTPX3/p:k7TEKScWy0bXrwjR/ukpTPR
Malware Config
Extracted
vidar
9
237
http://hotticketsale.com/
-
profile_id
237
Signatures
Files
-
1304-55-0x0000000000400000-0x0000000000520000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 460KB - Virtual size: 459KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE