Behavioral task
behavioral1
Sample
2920-119-0x0000000000400000-0x0000000000700000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2920-119-0x0000000000400000-0x0000000000700000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2920-119-0x0000000000400000-0x0000000000700000-memory.dmp
-
Size
3.0MB
-
MD5
c5b98bc7637c09f586089226ec465b8e
-
SHA1
3e206391110564831276d33e3f83031b1f6de03b
-
SHA256
56650e3e2f51c0b6e9cc8727c7821acbe9a8a7882d8b114ce1a5a211c492dac7
-
SHA512
739a815c715c07c3c1950a7017953ecbb29c430e8da7662ff2a677dfff85d2f6a80157f9996c4e22da93cd4363e1a94f785eae5159ed73d78634bb452b899d82
-
SSDEEP
6144:66lEj+hHjQyf6QhqXK98nBDiJvtM5JKsVVsO6JixUzi:6MEj+q5Vm8BDiFtKJKsVVN60
Malware Config
Extracted
vidar
5.2
f854f0dbeee9f947f2b405c13fb956d4
https://t.me/odyssey_tg
https://steamcommunity.com/profiles/76561199541261200
-
profile_id_v2
f854f0dbeee9f947f2b405c13fb956d4
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.30 (KHTML, like Gecko) Chrome/115.0.1.0 Safari/537.30
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2920-119-0x0000000000400000-0x0000000000700000-memory.dmp
Files
-
2920-119-0x0000000000400000-0x0000000000700000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 255KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ