General

  • Target

    924-56-0x0000000000400000-0x00000000006DB000-memory.dmp

  • Size

    2.9MB

  • MD5

    8c2f0cb52b8ec586d106d61423c121af

  • SHA1

    267e74e93b855ded37b51567faf114fc18f453dd

  • SHA256

    4bf013f017d1e7b5fef0df0b83b8b6950cefb7e682d491845c496e7ac3ac77b3

  • SHA512

    2c0b0ec26c43c8c394605ec4778dea774e7b4220bddaa168395c38287b5466c0b25c0a4fa825a3bdc942b5908a23881740a20a6bc726ea8d0bdb1188506bf40f

  • SSDEEP

    6144:hmLEm87VHIUvOciQyMvgaw0ZYkFY1ckE+FFh+Pqt5q/FWka98Nol:8LEm87CAiawAYaY1ckE+FKPquNNrNC

Malware Config

Extracted

Family

vidar

Version

3.7

Botnet

aaf060b0dc778d6bbb93c2ef5b05c273

C2

https://steamcommunity.com/profiles/76561199501059503

https://t.me/mastersbots

Attributes
  • profile_id_v2

    aaf060b0dc778d6bbb93c2ef5b05c273

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 924-56-0x0000000000400000-0x00000000006DB000-memory.dmp
    .exe windows x86


    Headers

    Sections