Behavioral task
behavioral1
Sample
588-279-0x0000000000400000-0x000000000048C000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
588-279-0x0000000000400000-0x000000000048C000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
588-279-0x0000000000400000-0x000000000048C000-memory.dmp
-
Size
560KB
-
MD5
6fa5e7e2a9abafb6d83baaea2548f4d7
-
SHA1
5fef1e210b759ef97118b30f47f3924a889edd34
-
SHA256
ec870594ee0a98ba6413b262a6cd1d8c3addcfd79cadb6ce119e6725b0b24fb9
-
SHA512
43d397e5332dad2d51b1739b32b992c606cfecf3c1a5f57898366d23be3d5b2da54dd0023fbbe8c0d4f4918c803bf5b7e1d4e7eaa704a671affb208159ef2192
-
SSDEEP
12288:yl2/13vxcqRQG6KPwy44mYQ6/0hYYsKOzu:ZxcqRQGvPD4jYQbYYTOz
Malware Config
Extracted
vidar
5.1
d2840cabd9794f85353e1fae1cd95a0b
https://t.me/tatlimark
https://steamcommunity.com/profiles/76561199536605936
-
profile_id_v2
d2840cabd9794f85353e1fae1cd95a0b
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 588-279-0x0000000000400000-0x000000000048C000-memory.dmp
Files
-
588-279-0x0000000000400000-0x000000000048C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ