Behavioral task
behavioral1
Sample
2020-3-0x0000000000400000-0x0000000001A33000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2020-3-0x0000000000400000-0x0000000001A33000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2020-3-0x0000000000400000-0x0000000001A33000-memory.dmp
-
Size
22.2MB
-
MD5
3ded4e9cd76939c7662ba0c9429a56ef
-
SHA1
ca27e4cd72afc9a765153f4db01bbde8cea01b81
-
SHA256
b4c37d8363e4433efa6811eb0e3f1ee63d221ed7ad3fa9ca3a22dfcfcda7d46b
-
SHA512
44df9a441f8e15af4a82396795f1dc7d5914672a39226d4eebde59876e5aee046cf47b2c779a7b92a46c8c35245cf52e9c6345213e4e1b0fd0bac24fd7d2eaa9
-
SSDEEP
3072:k4Bx51WWmJJISOp3Bw/iTGwghyB7vC4bfd3uDR4nTNywp8ERlJ7K+VLXye87xf/g:lAWyuSO1BwaqwT3f4DiTNtb6+9Xyekx
Malware Config
Extracted
vidar
8
ab8ba484d8a6c9be7d043c05bea0aa9f
https://t.me/neoschats
https://steamcommunity.com/profiles/76561199644883218
-
profile_id_v2
ab8ba484d8a6c9be7d043c05bea0aa9f
-
user_agent
Mozilla/5.0 (Linux; Android 11; M2102J20SG) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Mobile Safari/537.36 EdgA/97.0.1072.78
Signatures
Files
-
2020-3-0x0000000000400000-0x0000000001A33000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ