Behavioral task
behavioral1
Sample
fb979976c41b0cd99b4b62fb319ec9e08b57dc865a90e858c90259cdd3413c30.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fb979976c41b0cd99b4b62fb319ec9e08b57dc865a90e858c90259cdd3413c30.exe
Resource
win10v2004-20240226-en
General
-
Target
fb979976c41b0cd99b4b62fb319ec9e08b57dc865a90e858c90259cdd3413c30.exe
-
Size
349KB
-
MD5
b3de9ac3741d8503b9886d7f6c9ee12e
-
SHA1
950b740f736291fb013c4f7efcd2618cde0cb348
-
SHA256
fb979976c41b0cd99b4b62fb319ec9e08b57dc865a90e858c90259cdd3413c30
-
SHA512
0a59657f2d6860927a26ef882f9a3182320c8b863b65d5bd4582fec3607b14ed2ad2cfd9d856e97eb2ae05ce4ca01cbe8e5f4cc0eb568d127d1411ed74c86c57
-
SSDEEP
6144:q+jfY43T97LdTJQnzkr5meQzK0uY5C0kfHaYyJv5xma2L6yYUPyBt0T9az:q+jffT97L9JQnzkr5meQzK0uuC0kSnLJ
Malware Config
Extracted
vidar
55.4
1657
https://t.me/truemansho
https://c.im/@xiteb15011
http://95.217.27.155:80
-
profile_id
1657
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fb979976c41b0cd99b4b62fb319ec9e08b57dc865a90e858c90259cdd3413c30.exe
Files
-
fb979976c41b0cd99b4b62fb319ec9e08b57dc865a90e858c90259cdd3413c30.exe.exe windows:5 windows x86 arch:x86
b72cbc79fc1fead86b580f2d8c254198
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetProcAddress
LoadLibraryA
FindFirstFileW
GetProcessHeap
SetEndOfFile
CreateFileW
FindNextFileW
HeapAlloc
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetLastError
HeapFree
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
LoadLibraryW
SetStdHandle
WriteConsoleW
CreateFileA
crypt32
CryptStringToBinaryA
Sections
.text Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ