Behavioral task
behavioral1
Sample
48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347.exe
Resource
win10v2004-20240221-en
General
-
Target
48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347
-
Size
213KB
-
MD5
eebb5ad0c880d132df75ce01560b4c38
-
SHA1
2ff2dd8b6e446b4777026c475a5261d0a759faae
-
SHA256
48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347
-
SHA512
ba53307f540b619055f14645eb7ca4e3cce043729a7b221bd15977b1488f6a5fa54b6cc6281becc56f051d7e7ee6dd06ca5d92ee67725d1b49d11dcf508cdc85
-
SSDEEP
3072:ypAkGTwpdGyFghGC4oPTdzlt1cSq1hmKDUtc8fTVoLG1+kytpj88ERlJ7K3A+l:yGkVGqghcordxtSXmKDqfTDyjo6Qi
Malware Config
Extracted
vidar
7.9
588d8377b56b2a00a0a8a354224b4fbc
https://116.203.3.120
https://t.me/hypergog
https://steamcommunity.com/profiles/76561199642171824
-
profile_id_v2
588d8377b56b2a00a0a8a354224b4fbc
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Signatures
Files
-
48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347.exe windows:5 windows x86 arch:x86
9f7f0b9085b628f0bac4f05bc2d2bce2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_EH_prolog
strlen
memcmp
__CxxFrameHandler3
strncpy
malloc
_wtoi64
atexit
??_V@YAXPAX@Z
memmove
memchr
strtok_s
strcpy_s
strchr
memcpy
??_U@YAPAXI@Z
memset
kernel32
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
ExitProcess
GetCurrentProcess
lstrlenW
lstrlenA
LocalAlloc
ReadProcessMemory
VirtualQueryEx
OpenProcess
FileTimeToSystemTime
CloseHandle
WaitForSingleObject
CreateThread
GetDriveTypeA
GetLogicalDriveStringsA
GetProcAddress
LoadLibraryA
HeapAlloc
VirtualAllocExNuma
HeapFree
LoadLibraryW
GetStringTypeW
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
GetModuleFileNameW
GetStdHandle
WriteFile
Sleep
RaiseException
EncodePointer
GetLastError
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsSetValue
GetModuleHandleW
SetLastError
GetCurrentThreadId
user32
CharToOemA
advapi32
RegOpenKeyExA
RegGetValueA
GetCurrentHwProfileA
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
ord155
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
vkd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE