Behavioral task
behavioral1
Sample
4308-6-0x0000000000400000-0x0000000000700000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4308-6-0x0000000000400000-0x0000000000700000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
4308-6-0x0000000000400000-0x0000000000700000-memory.dmp
-
Size
3.0MB
-
MD5
46b4bb5e257a9b622221cf97d7c635fa
-
SHA1
a5b9f32453f3b7898d70d77740275329db58dfd7
-
SHA256
4a404a670aed2616b140460cc7acf7ac6e0cb9ed2bcb617c6b7de7e45f320cdf
-
SHA512
d9c38b483275d34e257224d2823e08c70bb51f031cc860f9108f47d194fc8fa227c0f5ccb97582c01db4c90fdd975a6c0394fa42ec7a65f97778e27f9bd90415
-
SSDEEP
24576:Key05nEQXObrpEwMGNL/geFyNcTN+jv75TQn652VBuNyb6:xLZ+b1ELGJtF4ch+jvNm0Nyb6
Malware Config
Extracted
vidar
11.4
7c37934964656ffad71319cfd3f70c69
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
Files
-
4308-6-0x0000000000400000-0x0000000000700000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 687KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ