General

  • Target

    920-1114-0x0000000000400000-0x0000000000476000-memory.dmp

  • Size

    472KB

  • MD5

    4d5701ebbe93ef70600496a9f2c942c2

  • SHA1

    3ed59e052dfd9f1f11e983db9bca415f7e622830

  • SHA256

    d76a84ef99a5dc50edfa66e6e1efd363ca686b6b4b9e1e81617b1aa1ff061538

  • SHA512

    02e6dfc3b7dc64165d675c839a7b82ae9abea0e9e968e70835f4646f0a3f3b3b6430956aa31bba171a7922624ff52060d09806eb33116d5c0cc515f61e80ea0f

  • SSDEEP

    6144:aCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQBJg1Eahrb:adiXZMbKCxWIW+kmoRQB21EyiPhIn

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

e42599537c56c3ab94348265bcc4fa21

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    e42599537c56c3ab94348265bcc4fa21

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 920-1114-0x0000000000400000-0x0000000000476000-memory.dmp
    .exe windows x86


    Headers

    Sections