General

  • Target

    2920-119-0x0000000000400000-0x0000000000700000-memory.dmp

  • Size

    3.0MB

  • MD5

    c5b98bc7637c09f586089226ec465b8e

  • SHA1

    3e206391110564831276d33e3f83031b1f6de03b

  • SHA256

    56650e3e2f51c0b6e9cc8727c7821acbe9a8a7882d8b114ce1a5a211c492dac7

  • SHA512

    739a815c715c07c3c1950a7017953ecbb29c430e8da7662ff2a677dfff85d2f6a80157f9996c4e22da93cd4363e1a94f785eae5159ed73d78634bb452b899d82

  • SSDEEP

    6144:66lEj+hHjQyf6QhqXK98nBDiJvtM5JKsVVsO6JixUzi:6MEj+q5Vm8BDiFtKJKsVVN60

Malware Config

Extracted

Family

vidar

Version

5.2

Botnet

f854f0dbeee9f947f2b405c13fb956d4

C2

https://t.me/odyssey_tg

https://steamcommunity.com/profiles/76561199541261200

Attributes
  • profile_id_v2

    f854f0dbeee9f947f2b405c13fb956d4

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.30 (KHTML, like Gecko) Chrome/115.0.1.0 Safari/537.30

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2920-119-0x0000000000400000-0x0000000000700000-memory.dmp
    .exe windows x86


    Headers

    Sections