Behavioral task
behavioral1
Sample
864-138-0x0000000000400000-0x00000000004E6000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
864-138-0x0000000000400000-0x00000000004E6000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
864-138-0x0000000000400000-0x00000000004E6000-memory.dmp
-
Size
920KB
-
MD5
639f9d1615c4e995dcd465a5a491c18e
-
SHA1
a7967066de5639e0d4cd44356d5aba4fbe65a7bb
-
SHA256
e097003941bd8287fefad14442d997ab9d61ae01ab2f03540086d7e16657f598
-
SHA512
bc3c3a4d70f37ceaa9b46d33a48018eb16c63732aba9bc0b3c08cd4f01fc8ce79cdd8fc47663c5168a274df873e37284bf7d80539b41af178ff8de86cd840c89
-
SSDEEP
12288:idiXZMbKCxWIW+kmoRQx2mEyiPJIn4y/:icMxvWNUx2mfiPJ+/
Malware Config
Extracted
vidar
4.5
2ebbd44046441e3db5ceb8266ef0eeae
https://steamcommunity.com/profiles/76561199520592470
https://t.me/motafan
-
profile_id_v2
2ebbd44046441e3db5ceb8266ef0eeae
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 864-138-0x0000000000400000-0x00000000004E6000-memory.dmp
Files
-
864-138-0x0000000000400000-0x00000000004E6000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 251KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ