General

  • Target

    2144-54-0x0000000010000000-0x000000001006B000-memory.dmp

  • Size

    428KB

  • MD5

    14936ff2baa67c9b6419f9b809aaac2f

  • SHA1

    4e65300e78beb4bbbaef0aa9a0cc0b10f4e2d1b2

  • SHA256

    5203936f7a4392f6ae73f7cfb759d4d6254e55dd721780c9a3f9db62826290c9

  • SHA512

    4c940dcd3d556bf32a65756fca146c47b7a28996004f62614bed5b660c4737f3cc309ea562d48b2bc2f846f0c9016ccc631b5e789bff7a387bcf3b05b621f5a5

  • SSDEEP

    6144:Jo/d1m+/71Sr2Wn54DbY7ENJUI0ZePjfDkBVRXFMthWMVIO:q/dlu4DbyEwLZePjfDCRXFMCMV5

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

19c538606b75d27e13807e5f5b638b12

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    19c538606b75d27e13807e5f5b638b12

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2144-54-0x0000000010000000-0x000000001006B000-memory.dmp
    .dll windows x86


    Headers

    Sections