Behavioral task
behavioral1
Sample
3508-137-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
3508-137-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
3508-137-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
4df338b026564d3b7967e23156ef12d6
-
SHA1
a33566afeac42b37d5e2c84b0b8560bcfcd42639
-
SHA256
b0e194ada991c027467f71eccf682aefc455536c6b10c97c06968c1fe3a03ae1
-
SHA512
88e63e9fa34c779d4d97ad8a9511b32a4c6383c1fc01ca19a7718e65edcec5820801ae859b23980c4aebfd500f83f92e47f1b3bfcd799fee8080d8e5ab53f88b
-
SSDEEP
12288:sib4E1z9tDqi/sV3mHzeZOc+fG7Snbc5:sc1z9hqiC2IOcHWo
Malware Config
Extracted
vidar
4.6
7072c5597a95a19ba8e61ff54768338a
https://steamcommunity.com/profiles/76561199523054520
https://t.me/game4serv
-
profile_id_v2
7072c5597a95a19ba8e61ff54768338a
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3508-137-0x0000000000400000-0x00000000004A2000-memory.dmp
Files
-
3508-137-0x0000000000400000-0x00000000004A2000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 254KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 215KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ