General

  • Target

    1376-56-0x0000000000400000-0x00000000006E4000-memory.dmp

  • Size

    2.9MB

  • MD5

    3737ac78ea58e0ac6652a676fc4b78dd

  • SHA1

    51998c292cc8f08ae688b7b41bce2c20b3733476

  • SHA256

    ed5fc8a2a53a94d88f0cdcb971076ca3dc5244ddee577930421d3b8965ed4903

  • SHA512

    320dd51e0e39d97c771e2dc42f6816b437885bdec11eadeb6f2ff9bda2c93b3ec202bbadc26365ffe6dfedb5e0dd1c59e4a49298e9b754b29820d3a287279cd6

  • SSDEEP

    6144:dmLEm87VHIUvOciQyMvgaw0ZYkFY1ckB+KFh+PqtVkWkJR/WL:YLEm87CAiawAYaY1ckB+KKPqUNJIL

Malware Config

Extracted

Family

vidar

Version

3.7

Botnet

1d0a705c871bb45fb4177c16e7b384e4

C2

https://steamcommunity.com/profiles/76561199501059503

https://t.me/mastersbots

Attributes
  • profile_id_v2

    1d0a705c871bb45fb4177c16e7b384e4

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1376-56-0x0000000000400000-0x00000000006E4000-memory.dmp
    .exe windows x86


    Headers

    Sections