General

  • Target

    4004-134-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    7cc96ed7ac9ff357796cd724e80015e1

  • SHA1

    71f268481bb81b7b379e3ea3229802f2e8f54395

  • SHA256

    0555353f709a23092c831582799261d4aa5a2378c75f32f6fe6c143e00039dbb

  • SHA512

    cd6cf62c12174d599fe47358b4511bd1e9df9270a5c7e200e492d94647184790e9adc5c45ede2deafbfbbc9f185e597eab236f45158c2866a512bd8a4cb450e9

  • SSDEEP

    6144:guQRHexuieV+IiVN3f9MY8DWGUQOElBtObJV9DKhoCYLItUQNhuC:guQRHexuieQ/EbYbxDKKtItUQK

Malware Config

Extracted

Family

vidar

Version

3.2

Botnet

83f2cf916c73491762db0bde582bd065

C2

https://steamcommunity.com/profiles/76561199482806358

https://t.me/tabootalks

Attributes
  • profile_id_v2

    83f2cf916c73491762db0bde582bd065

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Signatures

Files

  • 4004-134-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections