Behavioral task
behavioral1
Sample
1968-103-0x0000000000400000-0x00000000006C7000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1968-103-0x0000000000400000-0x00000000006C7000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1968-103-0x0000000000400000-0x00000000006C7000-memory.dmp
-
Size
2.8MB
-
MD5
df955f9663ef91b8b0cb5eee917aac8b
-
SHA1
cfb9d5f72a348403d68d486bea64b8a294c2c6a8
-
SHA256
228987fd4b025a11fcdab9b20cdb5e819db333ba1c8eef1817b66cea2eb2722c
-
SHA512
aa6009ab99ce87929ebaef292d2b7d3596f787e0f12ed9e9f57934c53754a18fa233ac36cf63b2abb2672529e656ab709913b8844770f99306973f37c3eb2187
-
SSDEEP
6144:uCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQmJg7Eahrj:udiXZMbKCxWIW+kmoRQm27EyiPJInD
Malware Config
Extracted
vidar
4.5
12403f3562ffd49d3a3d2ce5d201f221
https://steamcommunity.com/profiles/76561199520592470
https://t.me/motafan
-
profile_id_v2
12403f3562ffd49d3a3d2ce5d201f221
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1968-103-0x0000000000400000-0x00000000006C7000-memory.dmp
Files
-
1968-103-0x0000000000400000-0x00000000006C7000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 251KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ