Behavioral task
behavioral1
Sample
4940-174-0x0000000000400000-0x0000000000465000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4940-174-0x0000000000400000-0x0000000000465000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
4940-174-0x0000000000400000-0x0000000000465000-memory.dmp
-
Size
404KB
-
MD5
f7a8ec581e9c6cb4d9d95ca6f0866442
-
SHA1
cefc4eb200f6086042752f35c3589197b76604b8
-
SHA256
313e96de8bb4f30ae69d62ee5bdb66755e285e371d37f7ed527dd453ac55b71e
-
SHA512
9589df30752793798804887a6b87d647e220998cc79d90e5c7810614994cb96f1b27261d18f6a3ba5ebe9dace46e5fc79d7f4199be684833de738d60def0cfea
-
SSDEEP
6144:cUNdslLON1aPsi5chCRXmI4/LusZbXm+QRADNVJCcfhOqUZABMYUB:cxGwP/OWOxXm+4AlCc+mKxB
Malware Config
Extracted
vidar
6.1
13088c19c5a97b42d0d1d9573cc9f1b8
https://steamcommunity.com/profiles/76561199563297648
https://t.me/twowheelfun
-
profile_id_v2
13088c19c5a97b42d0d1d9573cc9f1b8
-
user_agent
Mozilla/5.0 (iPad; CPU OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/605.1.15
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4940-174-0x0000000000400000-0x0000000000465000-memory.dmp
Files
-
4940-174-0x0000000000400000-0x0000000000465000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ