General

  • Target

    1580-248-0x0000000000400000-0x00000000006EA000-memory.dmp

  • Size

    2.9MB

  • MD5

    df6d0756bf8c51d3047bf1ce57901bf2

  • SHA1

    ea84465f794bd5e674cd5b40750f654cf283508d

  • SHA256

    dca21f55e1c4c0b1c6734b00e61d746cce6a1e0758d60b6b7eeaee0bebc362d4

  • SHA512

    e9b018b9284f2b99dea072efc8617ab9b2ffe818e37304aab90396f63b1959f769ab7d235eebec8cf1427edf8d1eb35a90bc9a742af1327e223a8e9b8641f2fb

  • SSDEEP

    6144:7ua5z4XeLqMVc2Uc1ax/QfTyuAlHKdlJH0KQah6wu2AizAvFe:7V5z4XPMPA/QryvodlJH0KQTTFe

Malware Config

Extracted

Family

vidar

Version

3.8

Botnet

e5d7cb6205191dc1a4f6288000860943

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    e5d7cb6205191dc1a4f6288000860943

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1580-248-0x0000000000400000-0x00000000006EA000-memory.dmp
    .exe windows x86


    Headers

    Sections