General

  • Target

    2004-1474-0x0000000000400000-0x00000000004A1000-memory.dmp

  • Size

    644KB

  • MD5

    83c8556d666cce3ab685ad0735d9ea88

  • SHA1

    3ce9c465d21b9d909c1f3bd0309aaf08f4481093

  • SHA256

    6af590abde8f5e4844503c036fbed79e1fc47bb221f4aea6f51a3f3ad31df75f

  • SHA512

    19196f6bb9889e75a4d6c3a3d68d1d0ff566cc58e45e4c58891901d3db7ea516163c8f0a4daf2a44e69ed5d8b8aa48ff95d334b9330b4e03ed7deeef5fa734c8

  • SSDEEP

    12288:ihyTurb4C9y7vJSm1t3aJXMOlabM2jObU2SMvyqtn9rBz3mLEPFzXWxVIc64:iYTskC9y7BSm1t3aJXMOlabM2CAmvJ5M

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-1474-0x0000000000400000-0x00000000004A1000-memory.dmp
    .exe windows x86


    Headers

    Sections