General

  • Target

    1796-56-0x0000000000400000-0x00000000006C7000-memory.dmp

  • Size

    2.8MB

  • MD5

    71a8d3e5a82f056fd22b1ee222561ccc

  • SHA1

    e21623189a1c169d3755246172d57f78502b8f6d

  • SHA256

    ac4c17341b6f1517e3d6d0da3ca5fd5d38893827e325fbd7c3b1a67e9501c2e9

  • SHA512

    25c7592fea297974e0a7f06f763dcf7daa2bb83df9d029a7821f66d95ca3aa51b36db92acf4a00e400ffa9e9b8567b449d0e44c7d4351f5ad8db5340d9a6de55

  • SSDEEP

    6144:uCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQ2Jg7Eahr/:udiXZMbKCxWIW+kmoRQ227EyiPxInr

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

12403f3562ffd49d3a3d2ce5d201f221

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    12403f3562ffd49d3a3d2ce5d201f221

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1796-56-0x0000000000400000-0x00000000006C7000-memory.dmp
    .exe windows x86


    Headers

    Sections