General

  • Target

    2008-105-0x0000000000400000-0x0000000002382000-memory.dmp

  • Size

    31.5MB

  • MD5

    d3fbf0c8d9a66c05142a213751d753d9

  • SHA1

    53d9fdea4cffc5686c4ffd47a24825277dbbe144

  • SHA256

    a310fe3c955fd3b8f387ac516c758cc7e81fd6d283f6f97b9ad9725438d2dd43

  • SHA512

    8b80a2cc757bc429490a2282f639491f4a3dedb124a2c522d64919d2f13c684357568b4fb66078e500f7bc948eaa1be1e2991e1b782f8aed40122b4fc0cebcd5

  • SSDEEP

    6144:lua5z4XeLqMVc2Uc1ax/QfTyuAlHKdlJl0KXah6wu2AifXHvFiUmBtc:lV5z4XPMPA/QryvodlJl0KXTEF8Bt

Malware Config

Extracted

Family

vidar

Version

3.8

Botnet

d8958658dc9e134f3763d2801e6c3d03

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    d8958658dc9e134f3763d2801e6c3d03

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2008-105-0x0000000000400000-0x0000000002382000-memory.dmp
    .exe windows x86


    Headers

    Sections