Behavioral task
behavioral1
Sample
2024-10-09_5506e71ff05d4a78ca4fd220c72b3971_mafia_vidar.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_5506e71ff05d4a78ca4fd220c72b3971_mafia_vidar.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_5506e71ff05d4a78ca4fd220c72b3971_mafia_vidar
-
Size
4.6MB
-
MD5
5506e71ff05d4a78ca4fd220c72b3971
-
SHA1
f94167421c772b627eeb7c97ea308db3c90fa104
-
SHA256
6ad6ec268af43d2b11ba1fbadb0a040dfde05c550b18ef17cfb1a0f4c630a1ec
-
SHA512
e0abae3f73c678cbd9417556b7a246841fa0e9dfbac8cd6ffe23b95ed4456f98ec7c60ad584506c708cd79e88807e146950b060a5c815a97f45bbcb5b98e919a
-
SSDEEP
6144:4lN4qDd+NAUHoG6yJB8WLWijd+/wn/TL9/5pfhzzC+U6h4:IN4qDcNNIWvcijdd/TB/5pfhzWQ
Malware Config
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-09_5506e71ff05d4a78ca4fd220c72b3971_mafia_vidar
Files
-
2024-10-09_5506e71ff05d4a78ca4fd220c72b3971_mafia_vidar.exe windows:5 windows x86 arch:x86
b8257e9ceea6453745b9197e8e97e32c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
LocalAlloc
lstrcatA
GetProcAddress
LoadLibraryA
VirtualProtect
Sleep
MultiByteToWideChar
FindNextFileW
FindFirstFileW
GetProcessHeap
SetEndOfFile
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
GetLastError
HeapFree
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
GetLocaleInfoW
HeapReAlloc
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryW
WriteConsoleW
SetStdHandle
CreateFileA
CreateFileW
Sections
.text Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ