General

  • Target

    1236-56-0x0000000000400000-0x00000000006F1000-memory.dmp

  • Size

    2.9MB

  • MD5

    b06fdac7d5331a2124bb1d3aa5059024

  • SHA1

    2fa6e2fad328392d7795c9f4517b3aa992dc4d80

  • SHA256

    5822abdf1c32ff2c1418b69f13d5c58e7b26ad54c8f2c085858701797ac775dd

  • SHA512

    837ed92e95326b2155ed5bdf100a65171b9b83344a77a19dd7820313bd6e6b405d14433dbd277903e557588126c80468b7e97db7293acec503ab8e4c09fee7d1

  • SSDEEP

    6144:7tvmJgFrko8B4/xw8ksPSGbEgajKliSmRQSMhUENbdz/Qg:7tvmJapksPS4ELIiSlSINbdz/Q

Malware Config

Extracted

Family

vidar

Version

4.1

Botnet

a247b760bbf343752090be1436805458

C2

https://t.me/task4manager

http://23.88.46.113:80

https://steamcommunity.com/profiles/76561199510444991

Attributes
  • profile_id_v2

    a247b760bbf343752090be1436805458

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Edg/112.0.1722.34

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1236-56-0x0000000000400000-0x00000000006F1000-memory.dmp
    .exe windows x86


    Headers

    Sections