Behavioral task
behavioral1
Sample
88f413c96604670ea6b1184c236b390468e9d4b16d35ed02701409b4a6f0233aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88f413c96604670ea6b1184c236b390468e9d4b16d35ed02701409b4a6f0233aN.exe
Resource
win10v2004-20240802-en
General
-
Target
88f413c96604670ea6b1184c236b390468e9d4b16d35ed02701409b4a6f0233aN
-
Size
2.3MB
-
MD5
81ea5574893bea66072640f30c7c0060
-
SHA1
55309a096c4956c808cc5d8e327c6f75fafe24c4
-
SHA256
88f413c96604670ea6b1184c236b390468e9d4b16d35ed02701409b4a6f0233a
-
SHA512
575bb135a237194cc62ec4f893e3c6c4b165160383be62cf5f6265c2c67928c102e1b75b82493fa4983b35909be3428a1908cb1cd47080c6c669c671fff498bb
-
SSDEEP
3072:6R+9MwiQ1/d0kzv4NmVcc18DM74+c9JDpdN3f5Bl5xoaq0jcp8HraqVmQdwuA:6RKMreKkzwNemDM7Ab3ix8F7wu
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Signatures
Files
-
88f413c96604670ea6b1184c236b390468e9d4b16d35ed02701409b4a6f0233aN.exe windows:5 windows x86 arch:x86
118187c3a5a9d853faf932e2bfb655fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strncpy
malloc
_wtoi64
??_V@YAXPAX@Z
atexit
memchr
strcpy_s
strchr
strtok_s
??_U@YAPAXI@Z
_time64
srand
rand
memmove
__CxxFrameHandler3
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapSize
WideCharToMultiByte
IsValidCodePage
GetOEMCP
ExitProcess
SetCriticalSectionSpinCount
FlsAlloc
HeapAlloc
GetCurrentProcess
HeapFree
VirtualFree
GetProcessHeap
WriteFile
VirtualAllocExNuma
Sleep
ReadFile
CreateFileW
lstrcatA
MultiByteToWideChar
GetTempPathW
GetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
GlobalMemoryStatusEx
ConvertDefaultLocale
lstrcmpiW
GetModuleHandleA
VirtualProtect
CloseHandle
lstrlenA
FreeLibrary
GetThreadContext
SetThreadContext
ReadProcessMemory
SetHandleCount
WriteProcessMemory
VirtualQueryEx
OpenProcess
GetComputerNameA
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
CreateProcessA
CreateDirectoryA
GetLogicalDriveStringsA
CreateThread
CreateFileA
GetFileSize
SetFilePointer
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SystemTimeToFileTime
GetTickCount
GetLocalTime
CreateFileMappingA
GetFileInformationByHandle
lstrcpyA
GetCPInfo
HeapSetInformation
GetCommandLineA
HeapReAlloc
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
SetConsoleCtrlHandler
IsProcessorFeaturePresent
GetCurrentThread
InterlockedDecrement
GetACP
GetCurrentThreadId
SetLastError
GetFileType
QueryPerformanceCounter
GetStartupInfoW
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
VirtualAllocEx
GetStringTypeW
InterlockedIncrement
TlsFree
RaiseException
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleFileNameW
GetStdHandle
GetModuleHandleW
HeapDestroy
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
RtlUnwind
HeapCreate
user32
GetDesktopWindow
OpenInputDesktop
wsprintfW
IsDialogMessageW
MessageBoxA
GetWindowLongW
ReleaseDC
GetWindowContextHelpId
GetCursorPos
SetThreadDesktop
RegisterClassW
IsWindowVisible
CharToOemA
gdi32
CreateDCA
GetDeviceCaps
advapi32
RegGetValueA
RegOpenKeyExA
GetUserNameA
GetCurrentHwProfileA
shell32
SHFileOperationA
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
shlwapi
ord155
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ