General

  • Target

    2032-56-0x0000000000400000-0x00000000004BF000-memory.dmp

  • Size

    764KB

  • MD5

    0a463404c7f98253a91c35fd851353b1

  • SHA1

    348815249e3cd097bae95dcbe77caa9c55331395

  • SHA256

    0bb35b884713cd940a341fa6f63b21bcbba6743217b9a2a4f13751db75df16b5

  • SHA512

    91877b2536ba5ce3cdbb3813ca8ab50bf9984c8fb168af0fb70155cb3d7599131a51546197bfeead4c76972a0240805e800d6865713d27489f345deabf1e79de

  • SSDEEP

    6144:CDZmBlZ87p0vRhZ/u8AfjVO0M9qm9YRTjOYRLXhMNO/MPp:CDZmBi0BA7g0Wqm9ejOYRLa6MP

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Signatures

Files

  • 2032-56-0x0000000000400000-0x00000000004BF000-memory.dmp
    .exe windows x86


    Headers

    Sections