General

  • Target

    2924-55-0x0000000001000000-0x000000000188E000-memory.dmp

  • Size

    8.6MB

  • MD5

    1392e45524b42b9caf1e646e4196d644

  • SHA1

    4f5ac170c47b43b61a9c964f1139f67dd0abb5cb

  • SHA256

    3326cd29b73c9441b583f10503a73dc0afbd0c42c9deb71b2994c7ed3c92b5e0

  • SHA512

    5b5de516e26f50a301891222745d69e92401c63bc058f4162473c80ca7cd6c6e2b0697e2810d34fa2f4f9cdb64b90359703043e11c56c1c0ebf61433d0b44940

  • SSDEEP

    196608:oiEjJ9y75JGWkBrj20X4y5p06rnW3EmW+TDNsDW8/cV3EpK1A:gJ9S5kB32XWLrnARrDNsDW10

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/eagl3z

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/eagl3z

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2924-55-0x0000000001000000-0x000000000188E000-memory.dmp
    .exe windows x86


    Headers

    Sections