Behavioral task
behavioral1
Sample
08ebf44504c59a45d9fb739eaf9c7ce1f8a57224674f55782f4373d13794006a.exe
Resource
win7-20240704-en
General
-
Target
08ebf44504c59a45d9fb739eaf9c7ce1f8a57224674f55782f4373d13794006a.exe
-
Size
206KB
-
MD5
4022bc5f1dcdf1a90d117aa67917cc41
-
SHA1
9126fba502990a26027d01588959c42c0480cba0
-
SHA256
08ebf44504c59a45d9fb739eaf9c7ce1f8a57224674f55782f4373d13794006a
-
SHA512
66672b764beb356b0a592f21bc4d9551d8297b5f278df5aed9fbdfa92afabd6a18066a6c8d4c9fe41e2236b1a28850b7d0b8400c3189232f40b6fcb1c1d29bfd
-
SSDEEP
3072:HQZ37mj1bVbRKEglAlJacFn6nE+SoareNsagziP9ufWo8X:wZLE1b2EWi7USoalqufWR
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199735694209
https://t.me/puffclou
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Signatures
Files
-
08ebf44504c59a45d9fb739eaf9c7ce1f8a57224674f55782f4373d13794006a.exe.exe windows:5 windows x86 arch:x86
14b0ac3afcc0fd8a741f8eb3917d4d03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcslen
memcmp
strlen
??_U@YAPAXI@Z
srand
rand
strncpy
malloc
_wtoi64
atexit
memchr
??_V@YAXPAX@Z
__CxxFrameHandler3
memmove
strtok_s
strchr
strcpy_s
memcpy
memset
kernel32
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
ExitProcess
GetCurrentProcess
LocalAlloc
lstrlenA
HeapFree
ReadProcessMemory
VirtualQueryEx
OpenProcess
HeapAlloc
GetProcessHeap
GetStringTypeW
FileTimeToSystemTime
CloseHandle
CreateProcessA
GetDriveTypeA
GetLogicalDriveStringsA
WaitForSingleObject
CreateThread
CreateDirectoryA
GetProcAddress
LoadLibraryA
lstrlenW
ReadFile
SetFilePointer
GetFileSize
GetFileInformationByHandle
MapViewOfFile
CreateFileMappingA
CreateFileA
WriteFile
SystemTimeToFileTime
GetLocalTime
GetTickCount
lstrcatA
lstrcpyA
GetCPInfo
GetComputerNameA
LoadLibraryW
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsSetValue
TlsGetValue
GetModuleFileNameW
RaiseException
GetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
GetModuleHandleW
Sleep
GetStdHandle
user32
CharToOemA
GetDesktopWindow
wsprintfW
advapi32
GetUserNameA
RegOpenKeyExA
RegGetValueA
GetCurrentHwProfileA
shell32
SHFileOperationA
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
shlwapi
ord155
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ