General

  • Target

    3472-165-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    10a897d635724cda1100ec92b9a2394f

  • SHA1

    80fbdb4493f200fdf0a047617d6f8fd54a97649c

  • SHA256

    4253e09e9245a057333de584e502bffd58712f24d4dfc1c8b09c3f9c8ba62c56

  • SHA512

    f72a8b8d81560ecb1b861b2ca16bc125a2805595bd9f4d38a60e778ecf5e32df90d8ecf97518ce77555a389f6f2b64b0c2f436dddc8affd484745a9ada57a5a1

  • SSDEEP

    6144:gDZmBlZ87p0vRhZ/u8AfjVO0M9qm9YzYTjOYRmXhMNJZM:gDZmBi0BA7g0Wqm9YGjOYRmaTM

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

0e17f083173cc2ea34d9ec9eba45b33f

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    0e17f083173cc2ea34d9ec9eba45b33f

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Signatures

Files

  • 3472-165-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections