General

  • Target

    57b0b0de8b21a0b02b379ce6bf7c27dd_mafia_JC.exe

  • Size

    336KB

  • MD5

    57b0b0de8b21a0b02b379ce6bf7c27dd

  • SHA1

    15468249e6d3de8c8bd852fd72fd91352b216d20

  • SHA256

    83ad35d22aac94c30f3d8ae124e782a4c214cccccff575ad642c8e2efac0d82f

  • SHA512

    96b967f8b80b55243b9cfa755cd1a6dac204d8112bdc459bb5bcf143d757b48d43867d742d3e673aa554a01729b8d31f143d4c781e4c750d7d141956b61c57a2

  • SSDEEP

    6144:jBcgHq3cDh0zuao5sQyAFCx2HI8w1ihNWzqW4hO32:jegHfDuQLFCYHT2ihxWt2

Malware Config

Extracted

Family

vidar

Version

4.3

Botnet

cf11fe7ad567662daa13f9a70672f437

C2

https://steamcommunity.com/profiles/76561199514261168

https://t.me/kamaprimo

Attributes
  • profile_id_v2

    cf11fe7ad567662daa13f9a70672f437

  • user_agent

    Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 57b0b0de8b21a0b02b379ce6bf7c27dd_mafia_JC.exe
    .exe windows x86

    a86fa734e02fd4666663da591d581430


    Headers

    Imports

    Sections