Behavioral task
behavioral1
Sample
2004-356-0x0000000000400000-0x0000000000471000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2004-356-0x0000000000400000-0x0000000000471000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2004-356-0x0000000000400000-0x0000000000471000-memory.dmp
-
Size
452KB
-
MD5
8a3e7525f58f0aa848c72ecc4aeaa1f0
-
SHA1
762db74a84eb8f002f2c00d368db98fa24e38426
-
SHA256
311220537a8137cf12953411dfcc6b0483eccb68bfdf8803b599298f7dc8fd6f
-
SHA512
653b64c64c275554f68cbf1bbfc3911836e685d2e6756f00798cf8142158c68a5767a67159ddff6457a339e3b3d57cb521d96f0f3b18dafd64bcabae1ac255a8
-
SSDEEP
6144:xpw8kWACDU/STv8wZlUci6JsjBz+Sf2NktnUTUUn8fslW:Tw8klCOSXlN0Fz+SfW2KPn80lW
Malware Config
Extracted
vidar
3
d6ef050131e7d5a1d595c51613328971
https://t.me/zaskullz
https://steamcommunity.com/profiles/76561199486572327
http://135.181.87.234:80
-
profile_id_v2
d6ef050131e7d5a1d595c51613328971
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2004-356-0x0000000000400000-0x0000000000471000-memory.dmp
Files
-
2004-356-0x0000000000400000-0x0000000000471000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ