General

  • Target

    5092-282-0x0000000000400000-0x000000000081B000-memory.dmp

  • Size

    4.1MB

  • MD5

    a7f9103343d7e246e0393c3d28a7858b

  • SHA1

    3a7e8ab2da5e7c73378d0bdc007cdc98e579af5f

  • SHA256

    1e6531e9238852fe77f29e755d0aeb66179027b51b8d1575d49082d958ef1e79

  • SHA512

    d6d592c7396d2fccdf5041938a35c3970d4beaf913c008adf8942edd0a3625cfcd069cbcf7b0ce3777f2b6b47d032d89d9fd9b66a2f5d167036a481f06013727

  • SSDEEP

    6144:CDZmBlZ87p0vRhZ/u8AfjVO0M9qm9YfTjOYRLXhMNA3MJu5ACV+4:CDZmBi0BA7g0Wqm9AjOYRLaEMJvCVH

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Signatures

Files

  • 5092-282-0x0000000000400000-0x000000000081B000-memory.dmp
    .exe windows x86


    Headers

    Sections