General

  • Target

    1680-54-0x00000000001C0000-0x0000000000749000-memory.dmp

  • Size

    5.5MB

  • MD5

    1db03c74c3923cde4e903988af13f312

  • SHA1

    41cba7394ed5a265e5c1bab4c1dcc38e03382cfe

  • SHA256

    f6f64b3e031401075fdebe5323d0928f2787d3f9f09495356ed32f207c28b3c1

  • SHA512

    d022ffacb259fe482157fbea27a485679edfc1fbca6bc072cd7fe99c1b68db426980dcd205c216dc6b73f4a7fab43d829f1e4f0b928ab550ab8cbd076c8d321b

  • SSDEEP

    98304:a3yYu8/iFnUZPJGYR90eW2A4SsEQ1L5RzPb7OA6TFE+/Nf:abu8/kUtJGweDstjpPzj7OA6TF3/Nf

Malware Config

Extracted

Family

vidar

Version

2.9

Botnet

c08c6f025148fe01c7578a5c54672d2e

C2

https://t.me/nemesisgrow

https://steamcommunity.com/profiles/76561199471222742

http://65.109.12.165:80

Attributes
  • profile_id_v2

    c08c6f025148fe01c7578a5c54672d2e

Signatures

  • Vidar family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

Files

  • 1680-54-0x00000000001C0000-0x0000000000749000-memory.dmp
    .exe windows x86


    Headers

    Sections