General

  • Target

    4012-160-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    4161e6fb9b393bdcf35059d4cd2d0236

  • SHA1

    430026a771b70fe2f3defdbd08ac1bf43a51ec7e

  • SHA256

    5d93b8c855ed713bb10c47e754d6678aa3427f8d221ad287534c48c1c4276cba

  • SHA512

    bfd99c8c002ecf8b0121d4b95c722c7b706e146449779d939bb4fb8a9a65469bf388b096ade99a4997a1ca6bb4cca36ece52bc1d9e73386be3fec9ec587c8cee

  • SSDEEP

    6144:IDZmBlZLL/HiTe77ZVBIG31bIzSp6TamF4E7kehqzuPhwAvO:IDZmBDHL2G39wSpCamFfdqzuWkO

Malware Config

Extracted

Family

vidar

Version

3.3

Botnet

028224d8754aad544d9c102ba2ac630c

C2

https://steamcommunity.com/profiles/76561199492257783

https://t.me/justsometg

Attributes
  • profile_id_v2

    028224d8754aad544d9c102ba2ac630c

  • user_agent

    Mozilla/5.0 (X11; Linux 3.5.4-1-ARCH i686; es) KHTML/4.9.1 (like Gecko) Konqueror/4.9

Signatures

Files

  • 4012-160-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections