Behavioral task
behavioral1
Sample
912-133-0x0000000000400000-0x00000000004CC000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
912-133-0x0000000000400000-0x00000000004CC000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
912-133-0x0000000000400000-0x00000000004CC000-memory.dmp
-
Size
816KB
-
MD5
b23d8f972cca9dca9ab3f32064fd83ed
-
SHA1
3911d5ea4a57118ca04aca583e4a6d4064d46e36
-
SHA256
fac09feb8b9484c156b97e6aaea6c1304804ad39b26458b01b1e490c08b3a1ed
-
SHA512
b865059533d95db7f3644fbe591a6a6118bfa414cbbd3969cd716b079c702413f4ca202f6bb0de5a3b8d64e30aeaa01f3aa8756f5a0e7fe66413acf64d97fed6
-
SSDEEP
6144:ABA0i2uim7rAPtf9w8zSRWBt9JPpr+hTtWzYFRh6ptPk7u1BjoH:AG0iwj9w8zS4BPJPpr+VFwk02
Malware Config
Extracted
vidar
4.3
96025c412217706dfea86d2504b62d27
https://steamcommunity.com/profiles/76561199514261168
https://t.me/kamaprimo
-
profile_id_v2
96025c412217706dfea86d2504b62d27
-
user_agent
Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 912-133-0x0000000000400000-0x00000000004CC000-memory.dmp
Files
-
912-133-0x0000000000400000-0x00000000004CC000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 250KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ