General

  • Target

    2024-54-0x0000000000AD0000-0x000000000160A000-memory.dmp

  • Size

    11.2MB

  • MD5

    bccf837148d446eb65f3c143903b14b4

  • SHA1

    ab9db6c9c5a6152fde7d5542ce35f6b6f4f56b4b

  • SHA256

    fc8c87f22bfea3c6bbed236ff3b8e240d5ae0b84bc4a70677e8a9255f615fceb

  • SHA512

    bc6c980ac6c343a79cc2cb7ebddc8d492bbb00fb7db74a63abc6b85e9f06eecd975db9341174e6fc581e229e219edda1067c2ecfd257e6345382a96cec77629d

  • SSDEEP

    196608:SpReULRqbyXOBJwT05S3u+CLp4RpJWXab5zB7+B2R/qX4qXIoB64IyWoHK4zk4ic:mwE+CTt++FpcXWO2RSX4qJIyWUk5fk

Malware Config

Extracted

Family

vidar

Version

4.1

Botnet

db94123c97f84f48244aa87eb478e324

C2

https://steamcommunity.com/profiles/76561199510444991

https://t.me/task4manager

Attributes
  • profile_id_v2

    db94123c97f84f48244aa87eb478e324

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Edg/112.0.1722.34

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-54-0x0000000000AD0000-0x000000000160A000-memory.dmp
    .exe windows x86


    Headers

    Sections