General

  • Target

    4268-265-0x0000000000400000-0x000000000046F000-memory.dmp

  • Size

    444KB

  • MD5

    e28d3f9d5735d4f6b4001005fa7078bb

  • SHA1

    11d263289196beefe954100100a94f07d47af2a2

  • SHA256

    e310a061405e93a285c5f73e3fb66e0ef5e8e2741fa15d64037f1dfe7d519702

  • SHA512

    9ad278d95a47168dc18f6a6a19881186cd202b3d0c32757c1be9b2e7b3aa5ca327a536ce45c0f170c7adf9d40f85e8c49b31d3bed3552baac8d4054782545260

  • SSDEEP

    12288:31HG549Wcfm+ZYIV5muWbI4krzdtVkOA:+WWcu+WIvmd64v

Malware Config

Extracted

Family

vidar

Version

5.3

Botnet

562ce294a991b18054802a17b24ce0f9

C2

https://t.me/buukcay

https://steamcommunity.com/profiles/76561199544211655

Attributes
  • profile_id_v2

    562ce294a991b18054802a17b24ce0f9

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4268-265-0x0000000000400000-0x000000000046F000-memory.dmp
    .exe windows x86


    Headers

    Sections