General

  • Target

    1356-174-0x0000000000400000-0x00000000004A1000-memory.dmp

  • Size

    644KB

  • MD5

    92843254846f9723b8e9cf43daaf8d43

  • SHA1

    c2219b59212661070b6b114e68c549d2443a0085

  • SHA256

    593d89665207bca70641f43de9c01611dd61aed101bbc220b7a40363826f734e

  • SHA512

    73e5c2c898b7368c22a4a0e19adc1e630012ca98e239977bb82935aa7ce58d166356e856d453e9bf4cad4eaa0ed4589cff2a20b756185e30acd1aa88f0be1ddb

  • SSDEEP

    12288:Aq1zfoxHiXpxQwsmStGaedjOTMaJNzhPjd2KqC7J9rBz3mLEPFzXWxVIc6YD:AyzQ5iXpxtsmStGaedjOTMaJ1xAxCx3Y

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

https://t.me/hwbhjegyuvbgyugge

C2

https://t.me/hwbhjegyuvbgyugge

https://t.me/jhfvykuwgfwekuifwbe

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    https://t.me/hwbhjegyuvbgyugge

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1356-174-0x0000000000400000-0x00000000004A1000-memory.dmp
    .exe windows x86


    Headers

    Sections