General

  • Target

    2320-132-0x0000000000400000-0x0000000001B7D000-memory.dmp

  • Size

    23.5MB

  • MD5

    35adddbc0eaee516807c96cd050889b7

  • SHA1

    e590c0716cb733ea0014518441dc24c718dd403f

  • SHA256

    e1d621911ced219d6690e038cfd4ac6f05b4d6ffb00aa0d92ef9134bac4b85ad

  • SHA512

    4747c361483d7f17ee73f149ec18d44e041ba223bea055ea38dfda6172699f51a5ac2b1f1840565e74ed18e014f385ebc9ac2a70972e9e3d68a93d861c115659

  • SSDEEP

    24576:rYTskC9y7BSm1t3aJXMOlabM2CAmvCx3F02jq:kZ7BSm1t3aJXMOlKYCx3F02G

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2320-132-0x0000000000400000-0x0000000001B7D000-memory.dmp
    .exe windows x86


    Headers

    Sections