General

  • Target

    228-224-0x00000000004B0000-0x000000000051D000-memory.dmp

  • Size

    436KB

  • MD5

    8781d2c33ef21eba723ee3f584fa9d31

  • SHA1

    e5d76b5ec52fbe609ae01c03d6a26ea2f518e164

  • SHA256

    bb9991168e73d376ad7827fd03a5a8f9cd1c0855094271867437546909a37582

  • SHA512

    f663f77166fca433c5972c17ad810d1fa42a846a775cf70d4108831721a2cca8c1ae7cfe882826cdaa56a070e16278dce3bec550f76839775cefd978007d4226

  • SSDEEP

    6144:Az9exemcYskmQKD3MnCMrbDgzcyj0CFG/9olEBkh1rIiOJZ:Az9exmYeQZCMrbcztj0CF5EBSInZ

Malware Config

Extracted

Family

vidar

Version

3.1

Botnet

ba1fc89d9f7df84dadf34886aabb246c

C2

https://t.me/owned001

http://65.109.236.2:80

https://t.me/tabootalks

https://steamcommunity.com/profiles/76561199472266392

http://135.181.26.183:80

Attributes
  • profile_id_v2

    ba1fc89d9f7df84dadf34886aabb246c

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Signatures

Files

  • 228-224-0x00000000004B0000-0x000000000051D000-memory.dmp
    .exe windows x86

    b369bbc164d048744e6eec8b48ca3684


    Headers

    Imports

    Sections