General

  • Target

    49d20752b0f8cd50a01a96eab16bbd1b_mafia_JC.exe

  • Size

    368KB

  • MD5

    49d20752b0f8cd50a01a96eab16bbd1b

  • SHA1

    2aa026869223267ec4b7b83f64cc1624ac99c3bb

  • SHA256

    9e3fc10cff834924295fd8f18790793a54c5b7f6ec52a114bbd4dab9c5f7f9ef

  • SHA512

    77da9ebc6c8af337fa68ccd3e81415d4ae96b87cb6eb78cc05498bb3d8fd155ed67ebae98beea5bbc98b8d85429e037e3de36d1d66dcb08dc0512a1e03db3d1f

  • SSDEEP

    6144:qHd2snwZDkCUbuu3zt3FrNPMXDuOYijvafatfhDV9XUBiljRFC:qHd2sncDkC03JFlMXKujvafaBhDV97G

Score
10/10

Malware Config

Extracted

Family

vidar

Version

2.4

Botnet

14

C2

https://t.me/gurutist

https://steamcommunity.com/profiles/76561199476091435

http://95.216.164.28:80

Attributes
  • profile_id

    14

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 49d20752b0f8cd50a01a96eab16bbd1b_mafia_JC.exe
    .exe windows x86

    d63b483d8e71fc96eb3e066a63e3102d


    Headers

    Imports

    Sections