General

  • Target

    2864-59-0x0000000000400000-0x000000000046F000-memory.dmp

  • Size

    444KB

  • MD5

    b2f384e27c1d9cd9b4aa0d935c0ae503

  • SHA1

    b416c40feda8e737eaaf422d7894ceac482bb89b

  • SHA256

    de4d177b7c60927fd66294358025d55b3f216141d032b72857f270c7ecab08fc

  • SHA512

    8a1464cc9232f032ae2b02d61703cc7da68f471f3b0014ac0ec946c54666b9c534c0e4428830a5a33ac03d9a2b12f157bc08ce723b8b06a90ee0ff1cbd4b9f71

  • SSDEEP

    6144:O2+XqGAdyvA944aSL0g7SLjxhDOfeNROhXkO6J5IUUZfA:O2+XqUvA92/gGLjzDqeNROhl6TS

Malware Config

Extracted

Family

vidar

Version

5.2

Botnet

35aa2808fb90f9e9dac907e1be77f310

C2

https://t.me/odyssey_tg

https://steamcommunity.com/profiles/76561199541261200

Attributes
  • profile_id_v2

    35aa2808fb90f9e9dac907e1be77f310

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.30 (KHTML, like Gecko) Chrome/115.0.1.0 Safari/537.30

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2864-59-0x0000000000400000-0x000000000046F000-memory.dmp
    .exe windows x86


    Headers

    Sections