General

  • Target

    1360-56-0x0000000000400000-0x00000000004BE000-memory.dmp

  • Size

    760KB

  • MD5

    6bfd9d9547b9281abf62f5bc710ef5db

  • SHA1

    a9f68fc8ddbf881845fb3d833acfc5148f8266b8

  • SHA256

    e1d3c65e21ff8df6c3f9b2fa6275f37ad0bf8fca0724c546a3b1f27e17cec714

  • SHA512

    572c7e465bcf5e4d9fcfe743fa756aec76815e81ccc450ce5fb379d68c6947fd745e7f388a78300161119f972e513eef928f79003a8dbf849e811fb66ca448ce

  • SSDEEP

    6144:GBcgHq3cDh0zuao5sQyAFCx2HI8w1ih2WzqY4hrqt2:GegHfDuQLFCYHT2ihAYV2

Malware Config

Extracted

Family

vidar

Version

4.3

Botnet

e74b5ad2e63124e58425d1fb3ed3cd89

C2

https://steamcommunity.com/profiles/76561199514261168

https://t.me/kamaprimo

Attributes
  • profile_id_v2

    e74b5ad2e63124e58425d1fb3ed3cd89

  • user_agent

    Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1360-56-0x0000000000400000-0x00000000004BE000-memory.dmp
    .exe windows x86


    Headers

    Sections