General

  • Target

    2732-117-0x0000000000400000-0x000000000046E000-memory.dmp

  • Size

    440KB

  • MD5

    d8d240029a91c3e0af71c6f02ee675f1

  • SHA1

    f76d422a8493983c76065ce35e42373045991e84

  • SHA256

    bdfcd028f854c8c3d613e4425726cfff13de32ab8c3f9c6d2bcaf5c35325c8b4

  • SHA512

    46ef45e5ce1602a3d3a74c85110b293264fb487b47c9b59b48e0c0d9e319399bb17ace970d585dc40f7a0ddbc1bdae9c7e77cae91af43f76b4dc39835e5b39f8

  • SSDEEP

    6144:/rvkfHnWovSb3LfALGcYTexa9ElV8ef1WVTIC5O/bQO6JlbpU:/ronWF3Lf9KxQEl2ekVTH5O/t6fb

Malware Config

Extracted

Family

vidar

Version

5.2

Botnet

fc739d10ffb375b8b62b035974e9646d

C2

https://t.me/odyssey_tg

https://steamcommunity.com/profiles/76561199541261200

Attributes
  • profile_id_v2

    fc739d10ffb375b8b62b035974e9646d

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.30 (KHTML, like Gecko) Chrome/115.0.1.0 Safari/537.30

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2732-117-0x0000000000400000-0x000000000046E000-memory.dmp
    .exe windows x86


    Headers

    Sections