Behavioral task
behavioral1
Sample
2020-81-0x0000000000400000-0x0000000000648000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2020-81-0x0000000000400000-0x0000000000648000-memory.exe
Resource
win10v2004-20240704-en
General
-
Target
2020-81-0x0000000000400000-0x0000000000648000-memory.dmp
-
Size
2.3MB
-
MD5
a0508b9d13473898c18eb42dcfe7dc65
-
SHA1
fab7d1b07c367b2d7aada59a087e43889962eca1
-
SHA256
f650905770c27d8f858f0447782d368e1650d1cbeec62a8d3a7ebc47e37b6751
-
SHA512
f44b09d182e85e3805f498a02e3d726b21998b96e51dc85492eb27b897fa3af27780aaef0bc0b4f8db0d3e3a025177cb98f4d590a4a2bf546357e33ea1b5819e
-
SSDEEP
3072:lTQm3axZbvWtCyEwVt2IUE5iujhGzCLEoSreNsagz6p9ufjol:2mqHbv+EwiIf5ykEoSlMufj
Malware Config
Extracted
vidar
https://t.me/bu77un
https://steamcommunity.com/profiles/76561199730044335
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Signatures
Files
-
2020-81-0x0000000000400000-0x0000000000648000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ