General

  • Target

    1428-357-0x0000000000400000-0x0000000000476000-memory.dmp

  • Size

    472KB

  • MD5

    7596fc21a201289db4680d6cb0054456

  • SHA1

    e998f52e905c2c48cb96f8a3a1d1d32c24c09da0

  • SHA256

    5f6dc2e18214213a092500c2addd3b1fedb68d3c46b171d536929e252d43c6f7

  • SHA512

    12e5e1993c28c10433b14fc360659820899906b332e1d89f6f156f90035926c3d57a51b1c7aacc9a3f387238929efb9badcb191d80ecf1859e1602e8a4d68677

  • SSDEEP

    6144:nCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQ1Jg4Eahrw:ndiXZMbKCxWIW+kmoRQ124EyiPqIn

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

75b38583a079a9212c1fa894fd1b945f

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    75b38583a079a9212c1fa894fd1b945f

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1428-357-0x0000000000400000-0x0000000000476000-memory.dmp
    .exe windows x86


    Headers

    Sections