General

  • Target

    2696-430-0x0000000000400000-0x00000000004A1000-memory.dmp

  • Size

    644KB

  • MD5

    eb4b47b22205afe5c14ba2887ac1fe02

  • SHA1

    18bc25896a08c34742fbe2efc9bfd5c9c71178fa

  • SHA256

    d5a9c72334f242cf9193d17808badf45f71bfe74d7f840adb7a8d21af3796eda

  • SHA512

    8eaa79f8d2130d151691024b5e611a32ae817b0fcd30016effcffd3cb85160c1ff33364f09db959fb9ea72f572755a42ff11a856cbb8d3cab5815e7520e13b1a

  • SSDEEP

    12288:shyTurb4C9y7vJSm1t3aJXMOlabM2jObU2SMvIqcn9rBz3mLEPFzXWxVIc6v:sYTskC9y7BSm1t3aJXMOlabM2CAmvj47

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2696-430-0x0000000000400000-0x00000000004A1000-memory.dmp
    .exe windows x86


    Headers

    Sections