General

  • Target

    3752-138-0x0000000000620000-0x00000000006C1000-memory.dmp

  • Size

    644KB

  • MD5

    328192d93dc658ea9856376191714bed

  • SHA1

    a0e76583ade3e3819909f8ed688be449da531dfa

  • SHA256

    d0a4b423a5c2d94a8dcd380029ee0df8a2b600617b58151e7a0667fa5656d820

  • SHA512

    1172c255457040e08f63369f2effae8806547a691bc6b5eda1589e653f17b7ba8dd1902856857474978b7c052ae9479b6d6bf056a2ceef5a2d8f6dd5dfef7547

  • SSDEEP

    12288:+TX+lYDAECEu+ew2/tq6WrIex+Uzyzt7REkqIfwqFP9rBz3mLEPFzXWxVIc6/b9:+T+KcECEuRw2/tq6WrIex+UGB7q0fbRL

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/rifbef734frbe43jfef

C2

https://t.me/rifbef734frbe43jfef

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/rifbef734frbe43jfef

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3752-138-0x0000000000620000-0x00000000006C1000-memory.dmp
    .exe windows x86


    Headers

    Sections