General

  • Target

    4256-152-0x0000000000400000-0x0000000000491000-memory.dmp

  • Size

    580KB

  • MD5

    b9178965f2c44fb60d9ce9c86ffe0873

  • SHA1

    e4b88676da852acf7340e4394c88e17d632ca41e

  • SHA256

    2a9313712e2f6bfb391439ba3bbe1479b7cc12217a6bb26b0f7f7f90e0ca2b50

  • SHA512

    b00cb6e44bc74ffcb3aa35627b79921c5a3aea228fb180fce8dadcfe164999b2ebab8c271ef8c4bbfd57e36cf98d1bf4e7433ccb506317bc3057d7f2b92e1c0c

  • SSDEEP

    12288:VbuRX6D7ENiKUqDgYumr6RXLRUNR+z5u:Vb26vENiWD736RTzo

Malware Config

Extracted

Family

vidar

Version

3.6

Botnet

6908ab4fa5f20120a1d1ab0aab96b784

C2

https://steamcommunity.com/profiles/76561199499188534

https://t.me/nutalse

Attributes
  • profile_id_v2

    6908ab4fa5f20120a1d1ab0aab96b784

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4256-152-0x0000000000400000-0x0000000000491000-memory.dmp
    .exe windows x86


    Headers

    Sections