General

  • Target

    2848-301-0x0000000000400000-0x00000000004A1000-memory.dmp

  • Size

    644KB

  • MD5

    99c8411ae36fc0713dba1564f08217e0

  • SHA1

    47a348af49e077278f7746cdce2b2b563120b8b4

  • SHA256

    84260391ea7f85d7a0b8246500ae48ff1dd674168d891f366c64e46564cb116b

  • SHA512

    50ebdf7dffd208086da57285f10e9597245b8a0bec0477941bce46a011ede23723c920a4b40d17fa779544c8101a63e33cddeb9cb0fc9205b0e3f4f96c0af233

  • SSDEEP

    12288:shyTurb4C9y7vJSm1t3aJXMOlabM2jObU2SMvGqcn9rBz3mLEPFzXWxVIc65:sYTskC9y7BSm1t3aJXMOlabM2CAmvF4N

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2848-301-0x0000000000400000-0x00000000004A1000-memory.dmp
    .exe windows x86


    Headers

    Sections