Behavioral task
behavioral1
Sample
1120-0-0x0000000000400000-0x000000000064A000-memory.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1120-0-0x0000000000400000-0x000000000064A000-memory.exe
Resource
win10v2004-20240419-en
General
-
Target
1120-0-0x0000000000400000-0x000000000064A000-memory.dmp
-
Size
2.3MB
-
MD5
63443692b5dea5a1d1e9090c3d1a4d1a
-
SHA1
9451cd63bf1ef1fd8225d18fbdad96d4aa573377
-
SHA256
5ba0c48f12ca7efea8a6016905fab32db7124a1e16664742a8d108f36161447e
-
SHA512
af4e692ef26b845af9d24b73dd265f9fe1b1943ff4369e828c2f4e5cd7fcee49b3a23dc8f3ea868ad0bb064c0a2b01e32fb0babfdfa337b19ce137b5ba98e7dd
-
SSDEEP
3072:UZWAfSR9CehJX4rRUiAPukFhm8qfuDUM41wvnFsocOHCpk5GK+lGjCQYpY:aDEBbAUUkFhfDs1w/u7rYjCQYp
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
Files
-
1120-0-0x0000000000400000-0x000000000064A000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ