General

  • Target

    4cacb0ece736e53294ae443c81de2863_mafia_JC.exe

  • Size

    361KB

  • MD5

    4cacb0ece736e53294ae443c81de2863

  • SHA1

    44d1873c9ef22f54a6fbc1068e00f0963bb0939e

  • SHA256

    eb709af8c9e8f2cc4a6769f886b088d7c46907a987a357b9e1b292ccf96fbcac

  • SHA512

    d34c1e4ad8d8192eb8e4cc7570223ddf9535f6a40c5a604531df3f4804236491f4871a3c1380650eda0eff1ee525a8d914f3a00c6a8528ca530cfd6321f7e4e4

  • SSDEEP

    6144:DObaqLJTVu+9QTOVe8AmC1S5WeCnwKIDQLpoG9h/dLS/6WUU54WhK:gJTVLTY8AO554IDQ9oG9dVS/6y0

Malware Config

Extracted

Family

vidar

Version

2.7

Botnet

c510ee2ea2fd590813412e32c84288a7

C2

https://t.me/robertotalks

https://steamcommunity.com/profiles/76561199480821604

http://95.217.157.160:80

Attributes
  • profile_id_v2

    c510ee2ea2fd590813412e32c84288a7

  • user_agent

    Mozilla/5.0 (X11; CrOS x86_64 14685.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.4992.0 Safari/537.36

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4cacb0ece736e53294ae443c81de2863_mafia_JC.exe
    .exe windows x86

    0d526314bd0b533093d33d4e87dfcf76


    Headers

    Imports

    Sections