General

  • Target

    1568-57-0x0000000000400000-0x000000000048D000-memory.dmp

  • Size

    564KB

  • MD5

    9e9d5e38c4238673ffcc25c1db9fb16e

  • SHA1

    2b8770e0a5e0067c0d6ad683a2b0a1489e02718d

  • SHA256

    16661508fa7a00c87f97158aa7fe0a88bb19e18a151c4b230b219d65b3218227

  • SHA512

    c278448d0cd3de228a9093263d6fc2e140261f16aff977fe89407d1aa068d71bbcde9792d3c0f2ce6d943aa0b18fb463b730bdf66c310767a020a587912bfcfd

  • SSDEEP

    6144:iDZmBlZ87p0vRhZ/u8AfjVO0M9qm9YzYTjOYRVXhMNJZMaadCAUvYGcK/dM:iDZmBi0BA7g0Wqm9YGjOYRVaTMg5LL/

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

76b614a229b9a88f7d0ba57796ab0fc2

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    76b614a229b9a88f7d0ba57796ab0fc2

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Signatures

Files

  • 1568-57-0x0000000000400000-0x000000000048D000-memory.dmp
    .exe windows x86


    Headers

    Sections