General

  • Target

    968-159-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    d04f181264028a7f5547856f7a6e6229

  • SHA1

    2382aff8d33f7ed7c61f29deaca4325c2280edf1

  • SHA256

    39eb27d903d2c68d6d1b2d3e2f8d3e27498948120bfd15a49165eca4b4cf075a

  • SHA512

    a47d8e990ddc34f2894d8a696d98f238cd974eb292cba8b156c41d0f5ecfee8e6117a907ddd0e82588245aa9b3ae39d19a44cf47c04d33c4bd5558546d3baf98

  • SSDEEP

    6144:7uQRHexuieV+IiVN3f9MY8DWGUQOElBtObJV9DKhoCYOItjCNhuC:7uQRHexuieQ/EbYbxDKK4ItjCK

Malware Config

Extracted

Family

vidar

Version

3.2

Botnet

5df88deb5dde677ba658b77ad5f60248

C2

https://steamcommunity.com/profiles/76561199489580435

https://t.me/tabootalks

Attributes
  • profile_id_v2

    5df88deb5dde677ba658b77ad5f60248

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Signatures

Files

  • 968-159-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections