General

  • Target

    2420-394-0x0000000000400000-0x00000000006EA000-memory.dmp

  • Size

    2.9MB

  • MD5

    ff9ea4560c520aafbfb46780f1a5758b

  • SHA1

    4e139bf4526691423619a92bfb3c7ed7c331f4e2

  • SHA256

    39a71d8b6295ad746b2c001d3a26156c5a0d6d4d240fe0b3f52225e313fe92a7

  • SHA512

    9499e944ba71a296a7874b04bc9d9dc1595905807b39107b252ebd71a3e956c5a3b7f7b6abba856f0ed2f8705ea93798dc93936c1169788d401d397464c2ec88

  • SSDEEP

    6144:7ua5z4XeLqMVc2Uc1ax/QfTyuAlHKdlJ30KQah6wu2AiNsvF9:7V5z4XPMPA/QryvodlJ30KQT1F9

Malware Config

Extracted

Family

vidar

Version

3.8

Botnet

e5d7cb6205191dc1a4f6288000860943

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    e5d7cb6205191dc1a4f6288000860943

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2420-394-0x0000000000400000-0x00000000006EA000-memory.dmp
    .exe windows x86


    Headers

    Sections