General

  • Target

    1168-59-0x00000000013C0000-0x0000000001E20000-memory.dmp

  • Size

    10.4MB

  • MD5

    78a2dc13800a2c27199a1df2dfae0a28

  • SHA1

    80ce9354867fd30374db8a58370169fdc8a753a7

  • SHA256

    eb2fddefedcb65fc7ae1e0086037ddfe834929c9a8878a03df679fba57d36992

  • SHA512

    34b26e9f527bf7db529cbf64fb20dff45de41194b20379d79150c16922c90694c431166ca4b004347dca9f4f1b7aa6a1ac2b3827e866fef8541f0d5689f51a66

  • SSDEEP

    196608:RcgIfBJmF54/bxNvOEoKwkjmwJs6LTH2cl1Xxwe/e04Fr:ABa54D/P3l9O6LTH2A1x5e0Y

Malware Config

Extracted

Family

vidar

Version

4.1

Botnet

7a7e92c53d4578948408f63a81b4d4fb

C2

https://t.me/task4manager

http://45.136.49.229:80

https://steamcommunity.com/profiles/76561199510444991

Attributes
  • profile_id_v2

    7a7e92c53d4578948408f63a81b4d4fb

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Edg/112.0.1722.34

Signatures

  • Vidar family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1168-59-0x00000000013C0000-0x0000000001E20000-memory.dmp
    .exe windows x86


    Headers

    Sections