General

  • Target

    1864-1006-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • MD5

    ef6b4385705d390b307bb6d5f43cab04

  • SHA1

    a396688c702732bd676d1a3f4c4e0a43c4d31490

  • SHA256

    60e5c6b3c964cc5d4e1eda836822bfb26eec8c842be625b152ade35b87e6b794

  • SHA512

    4b14424414d282c82826e7cfd9c89a7eab9d4cafea95661528d68d23a420d27f4edabb5ad24a0f66c4585cf6a46c7418158ec7710060c0361658861599ea0cf7

  • SSDEEP

    6144:NBA0i2uim7rAPtf9w8zSRWBt9JPpr+hT2WzYvRh6pavV7u1:NG0iwj9w8zS4BPJPpr+cvv0

Malware Config

Extracted

Family

vidar

Version

4.3

Botnet

89433a6dbe159bb95b623839dcca3e27

C2

https://steamcommunity.com/profiles/76561199514261168

https://t.me/kamaprimo

Attributes
  • profile_id_v2

    89433a6dbe159bb95b623839dcca3e27

  • user_agent

    Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1864-1006-0x0000000000400000-0x000000000046A000-memory.dmp
    .exe windows x86


    Headers

    Sections