General

  • Target

    1516-409-0x0000000000400000-0x000000000046F000-memory.dmp

  • Size

    444KB

  • MD5

    f98019b008cafbcf5009b3448b6ba0a5

  • SHA1

    01b3aea2383c3e44cf7541cbf3b9772561154d23

  • SHA256

    8af9df5f9c5d61214ba6357ea52a43b0d615e31e49469e95b7ee88d6f924e1b2

  • SHA512

    5c03eff522545e90d31440a1cfdab4d9cdc708b1379ed1a640e865674e963fa88fa6ab19bbcab9154c0a1a9ca8ab1167b24831df3dbca0a97a7d7fa3f6ef14b8

  • SSDEEP

    6144:O2+XqGAdyvA944aSL0g7SLjxhDOfeNROhakO6J5IUUbvGA:O2+XqUvA92/gGLjzDqeNROhI6TJ

Malware Config

Extracted

Family

vidar

Version

5.2

Botnet

35aa2808fb90f9e9dac907e1be77f310

C2

https://t.me/odyssey_tg

https://steamcommunity.com/profiles/76561199541261200

Attributes
  • profile_id_v2

    35aa2808fb90f9e9dac907e1be77f310

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.30 (KHTML, like Gecko) Chrome/115.0.1.0 Safari/537.30

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1516-409-0x0000000000400000-0x000000000046F000-memory.dmp
    .exe windows x86


    Headers

    Sections