General

  • Target

    93986d4e88a8c12ff6844cb508223379756d44f9f8762e3298ef5a5c657a6dc4

  • Size

    550KB

  • MD5

    a6dbcea6cb9c95c0e59c53dd15392b87

  • SHA1

    a5839a2676d4e0ce73ae66fc1e3ad2c87e9ed4f6

  • SHA256

    93986d4e88a8c12ff6844cb508223379756d44f9f8762e3298ef5a5c657a6dc4

  • SHA512

    62c22a95e8866002df28a8aa17408c8462b3e7440c4ec5df61654df2e44dc20abd0eb5e84101f2d2f510929ffe797a3ce7b7d91b3dbdcf79c32f87f93631e84a

  • SSDEEP

    12288:R4TJ5MTVnfaIJy31GiX1vMpGRN+hkjUs02c0tX3/V:GTJaBfJybBMpUohCUR2c0tN

Malware Config

Extracted

Family

vidar

Version

4.2

Botnet

11

C2

http://supermen22.beget.tech/

Attributes
  • profile_id

    11

Signatures

  • Masslogger family
  • Vidar Stealer 1 IoCs
  • Vidar family
  • Vidar log file 1 IoCs

    Detects a log file produced by Vidar.

Files

  • 93986d4e88a8c12ff6844cb508223379756d44f9f8762e3298ef5a5c657a6dc4
    .exe windows x86

    98b4cfcd7dfc1cefe6c1cd6068895d2d


    Headers

    Imports

    Sections