General
-
Target
6fb4a249e65fd7e0ff24323604b9bbc34324db76ec4978dcd193e1b23a5ac554
-
Size
316KB
-
MD5
51de33ffb264ed9871918a9176d5f5e9
-
SHA1
df0ce148a698b380a4d74b9c1f8fc7a9dd70a864
-
SHA256
6fb4a249e65fd7e0ff24323604b9bbc34324db76ec4978dcd193e1b23a5ac554
-
SHA512
cd0a03f4fa99e5d35c9d1a2e0c73adbee730095263ff8d205437f89f39a655e922720823648380460367e7419cc1a36dc02bce3330c0e526af214d25249aa18b
-
SSDEEP
6144:aUNdslLON1aPsi5chCRXmI4/LusZbXm+QRALNVJCnfhOqUZaBMYUB:axGwP/OWOxXm+4AdCn+oKxB
Malware Config
Extracted
vidar
6.1
af2b108237a470d5313ebab11ef5d055
https://steamcommunity.com/profiles/76561199563297648
https://t.me/twowheelfun
-
profile_id_v2
af2b108237a470d5313ebab11ef5d055
-
user_agent
Mozilla/5.0 (iPad; CPU OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/605.1.15
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fb4a249e65fd7e0ff24323604b9bbc34324db76ec4978dcd193e1b23a5ac554
Files
-
6fb4a249e65fd7e0ff24323604b9bbc34324db76ec4978dcd193e1b23a5ac554.exe windows:5 windows x86
62d315482935db63b6502d6a5f04722d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
FlsAlloc
lstrlenW
LocalAlloc
lstrcatW
HeapAlloc
GetProcessHeap
GetProcAddress
GetCurrentProcess
VirtualProtect
GetLogicalProcessorInformationEx
lstrlenA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
FindNextFileW
FindFirstFileW
SetEndOfFile
LoadLibraryA
ExitProcess
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
LoadLibraryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetLastError
HeapFree
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
GetLocaleInfoW
HeapReAlloc
user32
ReleaseDC
gdi32
GetDeviceCaps
CreateDCA
ole32
CoCreateInstance
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
oleaut32
VariantInit
VariantClear
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ