Behavioral task
behavioral1
Sample
1608-138-0x00000000010A0000-0x0000000001116000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1608-138-0x00000000010A0000-0x0000000001116000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
1608-138-0x00000000010A0000-0x0000000001116000-memory.dmp
-
Size
472KB
-
MD5
d0b8092f4df6e7a2f98db456c5c010ad
-
SHA1
962ec0be3b1a1efaf40750fa8956a6975927a719
-
SHA256
ef44927bffc58d3f90e274d1654dcdb24cfe78dabac2e4ce28a798ac7965a98c
-
SHA512
b5b21788d3534351c5416a8e933f814a9a8d1304042f77045da3d7a171eba500b8078b31e4e3b5a05a2dad3d7a6117945af1b873e9ff08903209ebaec9bdb516
-
SSDEEP
12288:jAJimGA0vaJkps+2rmILafjEp1DiPDIn:mYA0va6pc3afjyiPD
Malware Config
Extracted
vidar
4.5
3cfc9fefd81f869739a6003b27a51d67
https://steamcommunity.com/profiles/76561199520592470
https://t.me/motafan
-
profile_id_v2
3cfc9fefd81f869739a6003b27a51d67
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1608-138-0x00000000010A0000-0x0000000001116000-memory.dmp
Files
-
1608-138-0x00000000010A0000-0x0000000001116000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 251KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ