General

  • Target

    1404-133-0x0000000000400000-0x00000000004A1000-memory.dmp

  • Size

    644KB

  • MD5

    963df80907a995c7b35d75058334bd8d

  • SHA1

    830bc252ebe46e1d3540ffaa4e21c914a8814878

  • SHA256

    a69bac00b09e84e9af587316a036853d96b17c3abf5a78fe3c1d431dd5895319

  • SHA512

    005a45fe90ca6ea07a351a67e20306b7d8f8b963e82f335f48e53dd8edb4ea648e203156257bab3ecad65e87fc3981f1b0e6a49d8653c7122c48bf7c5ad81158

  • SSDEEP

    12288:shyTurb4C9y7vJSm1t3aJXMOlabM2jObU2SMvyq4n9rBz3mLEPFzXWxVIc6E:sYTskC9y7BSm1t3aJXMOlabM2CAmvJkw

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1404-133-0x0000000000400000-0x00000000004A1000-memory.dmp
    .exe windows x86


    Headers

    Sections