Behavioral task
behavioral1
Sample
948-55-0x0000000000400000-0x0000000000520000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
948-55-0x0000000000400000-0x0000000000520000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
948-55-0x0000000000400000-0x0000000000520000-memory.dmp
-
Size
1.1MB
-
MD5
e16f0750039b579b848848e1e1652bec
-
SHA1
1a143f5dd33f90cf0ee75c238bc5197114ffab9d
-
SHA256
fa541f8177d656fcf649444537b58eaff9b6097142f5c1439728e98a720e8790
-
SHA512
4843a9f2c67fb02288670faabe0fdb6ce0dc33e764df5bfdf6af8c3e4825b3eac9256e4929eede449d6d1394758000476845e69288aa0188c2f520d53dc07734
-
SSDEEP
12288:n0Ht9Tp+l0EqE1can/HVk0bXr5OjRPXSvvhkpoPX3/9:k7TEKScWy0bXrwjR/ukpoPl
Malware Config
Extracted
vidar
9
237
http://hotticketsale.com/
-
profile_id
237
Signatures
Files
-
948-55-0x0000000000400000-0x0000000000520000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 460KB - Virtual size: 459KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE