Behavioral task
behavioral1
Sample
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe
Resource
win10v2004-20241007-en
General
-
Target
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f
-
Size
292KB
-
MD5
9cc5ab9f921d3d7cb2e627fc9a89e901
-
SHA1
738d1eba7455ef319fe35014defd4ab1623d187c
-
SHA256
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f
-
SHA512
f1a0fdd301a9d4734dc63a236eea37d8142ea05164779f19d8474bf9fe0ff02dee053c3231c4313cc14a1ec0fba88fa7045b0205ea153fccc9387d5a01dc83a8
-
SSDEEP
6144:MiKNqzy8JFjVSZSJOyBiCmL5QZPNKNSQ7+STtqR9YjgD6vizk13Kb:Mi+q9I92Q1Tt3xvOb
Malware Config
Extracted
vidar
7.3
b258cf16f14faa3715bd942cece8035e
https://t.me/bg3goty
https://steamcommunity.com/profiles/76561199601319247
-
profile_id_v2
b258cf16f14faa3715bd942cece8035e
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0 uacq
Signatures
Files
-
32df75ebdf0e44f9351863160e89c89a000bebfa038ebb36dbb9e668ebcb045f.exe windows:5 windows x86 arch:x86
bcf77c2c3cd3748f83f9c44cda23fdb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strchr
strcpy_s
??_U@YAPAXI@Z
__CxxFrameHandler3
memcpy
strncpy
malloc
_wtoi64
atexit
??_V@YAXPAX@Z
memmove
memchr
strtok_s
memset
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapSize
VirtualFree
VirtualAlloc
ExitProcess
VirtualAllocExNuma
GetCurrentProcess
GetUserDefaultLCID
lstrlenA
LocalAlloc
ReadProcessMemory
VirtualQueryEx
OpenProcess
FileTimeToSystemTime
CloseHandle
WaitForSingleObject
CreateThread
GetDriveTypeA
GetLogicalDriveStringsA
GetProcAddress
LoadLibraryA
GetStringTypeW
MultiByteToWideChar
GetLocaleInfoA
EnumSystemLocalesA
lstrcmpiW
UnhandledExceptionFilter
LCMapStringW
WideCharToMultiByte
HeapSetInformation
GetCommandLineA
HeapReAlloc
HeapAlloc
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
IsValidCodePage
GetOEMCP
RaiseException
GetLastError
HeapFree
DecodePointer
EncodePointer
IsValidLocale
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
RtlUnwind
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
WriteFile
GetStdHandle
GetModuleFileNameW
SetConsoleCtrlHandler
GetCPInfo
GetACP
user32
CharToOemA
advapi32
RegOpenKeyExA
RegGetValueA
GetCurrentHwProfileA
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
ord155
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ