General

  • Target

    832-56-0x0000000000400000-0x0000000000AE0000-memory.dmp

  • Size

    6.9MB

  • MD5

    32f73d5938342fbba2025c78234e68d9

  • SHA1

    d409d69829e98de1f82665915579ef74b338976f

  • SHA256

    18c3d796391238712c0cf9602c46e81817e4831c0b2f860d7e6b689b74c3dee1

  • SHA512

    befc3e916fa012dbc926a946e27d26836e1210351b52a38e1e6194e59da9081ddcbfa10441ca5f4b68111e7b3616e87716278c558b5ce764efc950b509576bb6

  • SSDEEP

    196608:4tsRiDlPE4WEIaBSaFrhEKlAer3KybFlG:4tsRkHZBDrhEUZrzxlG

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

76b614a229b9a88f7d0ba57796ab0fc2

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    76b614a229b9a88f7d0ba57796ab0fc2

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Signatures

Files

  • 832-56-0x0000000000400000-0x0000000000AE0000-memory.dmp
    .exe windows x86


    Headers

    Sections