General

  • Target

    1992-62-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • MD5

    8386134a746d6736b1b1363d34a1648a

  • SHA1

    ca81e7e7cd52572ec855fa8cedfb1e928f6b73c0

  • SHA256

    e72074ba6e7c9a040a7fa17cf1efc0cadd2debe721847ca2b9eed1e21721c0de

  • SHA512

    5627cbdf6f25d5688a5d03cd3e236495f4acdf66d97c793ce993e94c6cd5edec0e2a9248669c410f80425d18adffea513ed48452bdf647dbfb17ed15d4ea476f

  • SSDEEP

    6144:ht7w69i2IiSi37j6uADO72myabHdNK/Ai3OTSP8hrJ:ht7w6KMGe72my8HfVi3cSPK

Malware Config

Extracted

Family

vidar

Version

4.1

Botnet

2348536df5fca20ff7fa4cddff87192a

C2

https://steamcommunity.com/profiles/76561199510444991

https://t.me/task4manager

Attributes
  • profile_id_v2

    2348536df5fca20ff7fa4cddff87192a

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Edg/112.0.1722.34

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1992-62-0x0000000000400000-0x000000000046A000-memory.dmp
    .exe windows x86


    Headers

    Sections